First published: Fri Oct 02 2020(Updated: )
CSRF vulnerabilities in the /cgi-bin/ directory of the WAVLINK WN530H4 M30H4.V5030.190403 allow an attacker to remotely access router endpoints, because these endpoints do not contain CSRF tokens. If a user is authenticated in the router portal, then this attack will work.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn530h4 Firmware | =m30h4.v5030.190403 | |
Wavlink WN530H4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-12123 is high.
The vulnerability ID is CVE-2020-12123.
An attacker can remotely access router endpoints by exploiting the CSRF vulnerabilities in the /cgi-bin/ directory of the WAVLINK WN530H4 M30H4.V5030.190403.
Yes, if a user is authenticated in the router portal, they can be affected by the CSRF vulnerabilities.
To fix the CSRF vulnerabilities, it is recommended to implement CSRF tokens in the endpoints of the /cgi-bin/ directory in the WAVLINK WN530H4 M30H4.V5030.190403 router.