First published: Thu Oct 23 2014(Updated: )
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda A32 Firmware | =5.07.53_cn | |
Tenda A32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-7281 is classified as moderate due to its potential to affect the authenticity of administrative actions.
To fix CVE-2014-7281, you should upgrade the firmware of the Tenda A32 router to the latest version provided by the manufacturer.
CVE-2014-7281 affects users of the Tenda A32 router running firmware version 5.07.53_CN.
CVE-2014-7281 is related to a cross-site request forgery (CSRF) attack that allows unauthorized device reboots.
An attacker exploiting CVE-2014-7281 can hijack the authentication of router administrators and initiate a reboot without their consent.