First published: Mon Sep 29 2014(Updated: )
Cross-site request forgery (CSRF) vulnerability in apply.cgi in Linksys WRT310Nv2 2.0.0.1 allows remote attackers to hijack the authentication of administrators for requests that change passwords and modify remote management ports.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Linksys WRT310N Router Firmware | =2.0.0.1 | |
Linksys WRT350N | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3068 has been categorized as a moderate severity vulnerability due to its potential impact on the security of administrator sessions.
To mitigate CVE-2013-3068, update the firmware of Linksys WRT310Nv2 and WRT350N routers to the latest stable version available.
CVE-2013-3068 allows remote attackers to perform cross-site request forgery attacks, potentially hijacking administrator sessions.
CVE-2013-3068 specifically affects Linksys WRT310Nv2 firmware version 2.0.0.1 and Linksys WRT350N firmware version 2.0.
CVE-2013-3068 exploits the lack of proper CSRF protection in the apply.cgi component of the affected routers.