Описание
NETGEAR WNR3500U and WNR3500L routers uses form tokens abased solely on router's current date and time, which allows attackers to guess the CSRF tokens.
Ссылки
- Third Party Advisory
- ExploitMitigationThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitMitigationThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:netgear:wnr3500u_firmware:1.2.2.44_35.0.53na:*:*:*:*:*:*:*
cpe:2.3:h:netgear:wnr3500u:-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:o:netgear:wnr3500l_firmware:1.2.2.44_35.0.53na:*:*:*:*:*:*:*
cpe:2.3:h:netgear:wnr3500l:-:*:*:*:*:*:*:*
EPSS
Процентиль: 44%
0.00217
Низкий
6.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-352
Связанные уязвимости
CVSS3: 6.5
github
почти 4 года назад
NETGEAR WNR3500U and WNR3500L routers uses form tokens abased solely on router's current date and time, which allows attackers to guess the CSRF tokens.
EPSS
Процентиль: 44%
0.00217
Низкий
6.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-352