Unibox SMB 2.4 and UniBox Enterprise Series 2.4 and UniBox Campus Series 2.4 contain a cross-site request forgery (CSRF) vulnerability in /tools/network-trace, /list_users, /list_byod?usertype=raduser, /dhcp_leases, /go?rid=202 in which a specially crafted HTTP request may reconfigure the device.
References
Link | Resource |
---|---|
http://wifi-soft.com | Vendor Advisory |
https://www.mail-archive.com/fulldisclosure@seclists.org/msg07139.html | Exploit Third Party Advisory |
https://s3curityb3ast.github.io/KSA-Dev-008.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Information
Published : 2021-04-09 06:15
Updated : 2021-04-14 12:20
NVD link : CVE-2020-21884
Mitre link : CVE-2020-21884
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
indionetworks
- unibox_u1000
- unibox_u500
- unibox_u50
- unibox_u500_firmware
- unibox_u1000_firmware
- unibox_u50_firmware
- unibox_u2500_firmware
- unibox_u5000_firmware
- unibox_u2500
- unibox_u5000