First published: Sun Mar 17 2019(Updated: )
ZyXEL VMG3312-B10B DSL-491HNU-B1B v2 devices allow login/login-page.cgi CSRF.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Zyxel Dsl-491hnu-b10b Firmware | ||
Zyxel DSL CPE devices | ||
All of | ||
Zyxel Dsl-491hnu-b1b V2 Firmware | ||
Zyxel Dsl-491hnu-b1b V2 | ||
Zyxel Dsl-491hnu-b10b Firmware | ||
Zyxel DSL CPE devices | ||
Zyxel Dsl-491hnu-b1b V2 Firmware | ||
Zyxel Dsl-491hnu-b1b V2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7391 is classified with a medium severity due to its potential impact on user authentication.
To fix CVE-2019-7391, update the firmware of your Zyxel VMG3312-B10B DSL-491HNU-B1B v2 devices to the latest version.
CVE-2019-7391 affects Zyxel VMG3312-B10B and DSL-491HNU-B1B v2 devices.
CVE-2019-7391 is a Cross-Site Request Forgery (CSRF) vulnerability.
Yes, CVE-2019-7391 can potentially allow an attacker to gain unauthorized access to the device's settings.