First published: Thu Dec 30 2010(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities on the iSpot 2.0.0.0 R1679, and the ClearSpot 2.0.0.0 R1512 and R1786, with firmware 1.9.9.4 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the cmd parameter in an act_cmd_result action to webmain.cgi, (2) enable remote management via an enable_remote_access act_network_set action to webmain.cgi, (3) enable the TELNET service via an ENABLE_TELNET act_set_wimax_etc_config action to webmain.cgi, (4) enable TELNET sessions via a certain act_network_set action to webmain.cgi, or (5) read arbitrary files via the FILE_PATH parameter in an act_file_download action to upgrademain.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Clear Ispot Firmware | =1.9.9.4 | |
Clear Ispot | =2.0.0.0-r1679 | |
Clear Clearspot Firmware | =1.9.9.4 | |
Clear Clearspot | =2.0.0.0-r1512 | |
Clear Clearspot | =2.0.0.0-r1786 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.