First published: Mon Jun 16 2014(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in the Zyxel P-660HW-T1 (v3) wireless router allow remote attackers to hijack the authentication of administrators for requests that change the (1) wifi password or (2) SSID via a request to Forms/WLAN_General_1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZyXEL P-660HW | =_t1-v3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4162 is considered a high severity vulnerability due to its potential to allow remote attackers to hijack administrative authentication.
To fix CVE-2014-4162, ensure that you update the firmware of your Zyxel P-660HW-T1 wireless router to the latest version provided by the manufacturer.
CVE-2014-4162 allows attackers to perform cross-site request forgery (CSRF) attacks, potentially leading to unauthorized changes to the Wi-Fi password and SSID.
CVE-2014-4162 affects users of the Zyxel P-660HW-T1 wireless router, specifically the v3 version.
To secure your router against CVE-2014-4162, implement access controls, change default settings, and regularly monitor firmware updates from Zyxel.