First published: Thu Jan 31 2008(Updated: )
Cross-site request forgery (CSRF) vulnerability in the management interface in multiple Yamaha RT series routers allows remote attackers to change password settings and probably other configuration settings as administrators via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yamaha RTA52i | ||
Yamaha RT56V | ||
Yamaha RTA50i | ||
Yamaha RT107E | ||
Yamaha RT58i | ||
Yamaha RTA54i | ||
Yamaha RTW65B | ||
Yamaha RT80i | ||
Yamaha RTX1000 | ||
Yamaha RTA55i | ||
Yamaha RT57i firmware | ||
Yamaha rt52pro | ||
Yamaha RT60W | ||
Yamaha RTV700 | ||
Yamaha SRT100 | ||
Yamaha RTX1500 | ||
Yamaha RTX1100 | ||
Yamaha RTW65i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0524 is considered a high severity vulnerability due to its potential to allow unauthorized changes to router configurations.
To fix CVE-2008-0524, update the firmware of your affected Yamaha RT series router to the latest version provided by the manufacturer.
CVE-2008-0524 affects multiple Yamaha RT series routers including models like RTA52i, RT56V, and many others.
CVE-2008-0524 is classified as a cross-site request forgery (CSRF) vulnerability.
Yes, CVE-2008-0524 can potentially lead to unauthorized access by allowing attackers to change password and other configuration settings.