First published: Thu Jan 31 2008(Updated: )
Cross-site request forgery (CSRF) vulnerability in the management interface in multiple Yamaha RT series routers allows remote attackers to change password settings and probably other configuration settings as administrators via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yamaha RT107E | ||
Yamaha RT52Pro | ||
Yamaha RT56V | ||
Yamaha RT57i firmware | ||
Yamaha RT58i | ||
Yamaha RT60W | ||
Yamaha RT80i | ||
Yamaha RTA50i | ||
Yamaha RTA52i | ||
Yamaha RTA54i | ||
Yamaha RTA55i | ||
Yamaha RTV700 | ||
Yamaha RTW65B | ||
Yamaha RTW65i | ||
Yamaha RTX1000 | ||
Yamaha RTX1100 | ||
Yamaha RTX1500 | ||
Yamaha SRT100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0524 is considered a high severity vulnerability due to its potential to allow unauthorized changes to router configurations.
To fix CVE-2008-0524, update the firmware of your affected Yamaha RT series router to the latest version provided by the manufacturer.
CVE-2008-0524 affects multiple Yamaha RT series routers including models like RTA52i, RT56V, and many others.
CVE-2008-0524 is classified as a cross-site request forgery (CSRF) vulnerability.
Yes, CVE-2008-0524 can potentially lead to unauthorized access by allowing attackers to change password and other configuration settings.