First published: Wed Oct 20 2021(Updated: )
ZTE MF971R product has a Referer authentication bypass vulnerability. Without CSRF verification, an attackercould use this vulnerability to perform illegal authorization operations by sending a request to the user to click.
Credit: psirt@zte.com.cn
Affected Software | Affected Version | How to fix |
---|---|---|
Zte Mf971r Firmware | =v1.0.0b05 | |
ZTE MF971R | ||
Zte Mf971r Firmware | =1v1.0.0b06 | |
Zte Mf971r Firmware | =2v1.0.0b03 | |
Zte Mf971r Firmware | =s2v1.0.0b03 | |
Zte Mf971r Firmware | =sv1.0.0b05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21745 is a vulnerability in the ZTE MF971R product that allows an attacker to bypass Referer authentication.
CVE-2021-21745 works by exploiting a lack of CSRF verification, allowing an attacker to perform unauthorized operations by tricking the user into clicking on a malicious request.
CVE-2021-21745 has a severity rating of medium with a CVSS score of 4.3.
The ZTE MF971R firmware versions v1.0.0b05, 1v1.0.0b06, 2v1.0.0b03, s2v1.0.0b03, and sv1.0.0b05 are affected by CVE-2021-21745.
To fix CVE-2021-21745, ZTE has released a security patch. Please refer to the ZTE Support page at the provided link for more information.