First published: Tue Feb 04 2014(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in TRENDnet TEW-812DRU router with firmware before 1.0.9.0 allow remote attackers to hijack the authentication of administrators for requests that (1) change admin credentials in a request to setSysAdm.cgi, (2) enable remote management or (3) enable port forwarding in an Apply action to uapply.cgi, or (4) have unspecified impact via a request to setNTP.cgi. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TRENDnet TEW-812DRU firmware | =1.0.8.0 | |
TRENDnet TEW-812DRU firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3098 has a medium severity rating due to its potential for unauthorized access and administrative control.
To fix CVE-2013-3098, upgrade the TRENDnet TEW-812DRU firmware to at least version 1.0.9.0 or later.
CVE-2013-3098 can facilitate cross-site request forgery (CSRF) attacks that allow remote attackers to change admin credentials or enable remote management.
CVE-2013-3098 affects the TRENDnet TEW-812DRU router with firmware versions prior to 1.0.9.0.
No, CVE-2013-3098 is primarily a firmware vulnerability that affects the software running on the router device.