ID

VAR-201104-0324


TITLE

O2 DSL Router Classic Cross-Site Request Forgery Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2011-1355

DESCRIPTION

The O2 DSL Router Classic is a router. O2 DSL Router Classic has a cross-site request forgery vulnerability. An attacker could exploit the vulnerability to execute arbitrary instructions in the context of a user session. This may aid in other attacks. Other attacks are also possible

Trust: 0.81

sources: CNVD: CNVD-2011-1355 // BID: 47261

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2011-1355

AFFECTED PRODUCTS

vendor:telef 3nica germanymodel:& co. ohg o2 dsl router classicscope:eqversion:0

Trust: 0.6

vendor:telefónica germanymodel:& co. ohg o2 dsl router classicscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2011-1355 // BID: 47261

THREAT TYPE

network

Trust: 0.3

sources: BID: 47261

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 47261

EXTERNAL IDS

db:BIDid:47261

Trust: 0.9

db:CNVDid:CNVD-2011-1355

Trust: 0.6

sources: CNVD: CNVD-2011-1355 // BID: 47261

REFERENCES

url:http://www.securityfocus.com/bid/47261/info

Trust: 0.6

url:http://permalink.gmane.org/gmane.comp.security.full-disclosure/78943

Trust: 0.3

url:http://www.o2online.de/dsl/o2-dsl-router.html

Trust: 0.3

sources: CNVD: CNVD-2011-1355 // BID: 47261

CREDITS

Hanno Böck

Trust: 0.3

sources: BID: 47261

SOURCES

db:CNVDid:CNVD-2011-1355
db:BIDid:47261

LAST UPDATE DATE

2022-05-17T02:02:40.360000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-1355date:2011-04-08T00:00:00
db:BIDid:47261date:2011-04-07T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2011-1355date:2011-04-08T00:00:00
db:BIDid:47261date:2011-04-07T00:00:00