ID

VAR-201410-1359


CVE

CVE-2014-7281


TITLE

Tenda A32 Router Cross-Site Request Forgery Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2014-07887 // CNNVD: CNNVD-201410-1235

DESCRIPTION

Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot. The Tenda A32 Router is a wireless router product from Tenda. A remote attacker could use the vulnerability to restart the device by sending a request to the goform/SysToolReboot URL. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks. Tenda A32 running firmware 5.07.53_CN is vulnerable; other versions may also be affected

Trust: 2.52

sources: NVD: CVE-2014-7281 // JVNDB: JVNDB-2014-005062 // CNVD: CNVD-2014-07887 // BID: 70579 // VULHUB: VHN-75226

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-07887

AFFECTED PRODUCTS

vendor:tendamodel:a32scope:eqversion:5.07.53_cn

Trust: 2.4

vendor:tendamodel:a32scope:eqversion: -

Trust: 1.0

vendor:tendamodel:a32scope: - version: -

Trust: 0.8

vendor: - model:tenda technology co.,ltd. a32 5.07.53_cnscope: - version: -

Trust: 0.6

vendor:tendamodel:a32 5.07.53 cnscope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2014-07887 // BID: 70579 // JVNDB: JVNDB-2014-005062 // CNNVD: CNNVD-201410-1235 // NVD: CVE-2014-7281

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-7281
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-7281
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-07887
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201410-1235
value: MEDIUM

Trust: 0.6

VULHUB: VHN-75226
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-7281
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-07887
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-75226
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-07887 // VULHUB: VHN-75226 // JVNDB: JVNDB-2014-005062 // CNNVD: CNNVD-201410-1235 // NVD: CVE-2014-7281

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-75226 // JVNDB: JVNDB-2014-005062 // NVD: CVE-2014-7281

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201410-1235

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201410-1235

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-005062

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-75226

PATCH

title:A32url:http://tenda.com.cn/Catalog/Product/325

Trust: 0.8

title:Top Pageurl:http://www.tenda.cn/Default.aspx

Trust: 0.8

title:US_A32V1.0br_V5.07.58_CNurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=52139

Trust: 0.6

sources: JVNDB: JVNDB-2014-005062 // CNNVD: CNNVD-201410-1235

EXTERNAL IDS

db:NVDid:CVE-2014-7281

Trust: 3.4

db:PACKETSTORMid:128671

Trust: 2.5

db:EXPLOIT-DBid:34969

Trust: 2.3

db:OSVDBid:113308

Trust: 1.7

db:BIDid:70579

Trust: 1.0

db:JVNDBid:JVNDB-2014-005062

Trust: 0.8

db:CNNVDid:CNNVD-201410-1235

Trust: 0.7

db:EXPLOITDBid:34969

Trust: 0.6

db:CNVDid:CNVD-2014-07887

Trust: 0.6

db:SEEBUGid:SSVID-87355

Trust: 0.1

db:VULHUBid:VHN-75226

Trust: 0.1

sources: CNVD: CNVD-2014-07887 // VULHUB: VHN-75226 // BID: 70579 // JVNDB: JVNDB-2014-005062 // CNNVD: CNNVD-201410-1235 // NVD: CVE-2014-7281

REFERENCES

url:http://packetstormsecurity.com/files/128671/tenda-a32-cross-site-request-forgery.html

Trust: 2.5

url:http://www.exploit-db.com/exploits/34969

Trust: 2.3

url:http://osvdb.org/show/osvdb/113308

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7281

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7281

Trust: 0.8

url:http://www.tenda.com.cn/catalog/product/325

Trust: 0.3

sources: CNVD: CNVD-2014-07887 // VULHUB: VHN-75226 // BID: 70579 // JVNDB: JVNDB-2014-005062 // CNNVD: CNNVD-201410-1235 // NVD: CVE-2014-7281

CREDITS

Zixian

Trust: 0.3

sources: BID: 70579

SOURCES

db:CNVDid:CNVD-2014-07887
db:VULHUBid:VHN-75226
db:BIDid:70579
db:JVNDBid:JVNDB-2014-005062
db:CNNVDid:CNNVD-201410-1235
db:NVDid:CVE-2014-7281

LAST UPDATE DATE

2025-04-13T23:21:24.263000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-07887date:2014-11-04T00:00:00
db:VULHUBid:VHN-75226date:2014-10-24T00:00:00
db:BIDid:70579date:2014-10-15T00:00:00
db:JVNDBid:JVNDB-2014-005062date:2014-10-28T00:00:00
db:CNNVDid:CNNVD-201410-1235date:2014-10-24T00:00:00
db:NVDid:CVE-2014-7281date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-07887date:2014-11-04T00:00:00
db:VULHUBid:VHN-75226date:2014-10-23T00:00:00
db:BIDid:70579date:2014-10-15T00:00:00
db:JVNDBid:JVNDB-2014-005062date:2014-10-28T00:00:00
db:CNNVDid:CNNVD-201410-1235date:2014-10-24T00:00:00
db:NVDid:CVE-2014-7281date:2014-10-23T14:55:02.367