First published: Fri Oct 12 2007(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in the Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allow remote attackers to perform actions as administrators via unspecified POST requests, as demonstrated by enabling an inbound remote-assistance HTTPS session on TCP port 51003. NOTE: an authentication bypass can be leveraged to exploit this in the absence of an existing administrative session. NOTE: SpeedTouch 780 might also be affected by some of these issues.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Alcatel SpeedTouch 7G Router | ||
BT Home Hub |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5384 has a medium severity rating due to its potential impact on user authentication within the affected devices.
To fix CVE-2007-5384, it is recommended to apply any available firmware updates or apply specific configurations to mitigate CSRF vulnerabilities.
CVE-2007-5384 affects the Thomson/Alcatel SpeedTouch 7G router and BT Home Hub devices.
CVE-2007-5384 describes multiple cross-site request forgery (CSRF) vulnerabilities that can allow unauthorized actions on the affected devices.
Remote attackers can exploit CVE-2007-5384 to perform unauthorized actions as administrators via specially crafted POST requests.