8.8
CVE-2021-20860
- EPSS 0.09%
- Veröffentlicht 01.12.2021 03:15:07
- Zuletzt bearbeitet 21.11.2024 05:47:17
- Quelle vultures@jpcert.or.jp
- CVE-Watchlists
- Unerledigt
Cross-site request forgery (CSRF) vulnerability in ELECOM LAN routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a remote authenticated attacker to hijack the authentication of an administrator via a specially crafted page.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Elecom ≫ Wrc-1167gst2 Firmware Version <= 1.25
Elecom ≫ Wrc-1167gst2a Firmware Version <= 1.25
Elecom ≫ Wrc-1167gst2h Firmware Version <= 1.25
Elecom ≫ Wrc-2533gs2-b Firmware Version <= 1.52
Elecom ≫ Wrc-2533gs2-w Firmware Version <= 1.52
Elecom ≫ Wrc-1750gs Firmware Version <= 1.03
Elecom ≫ Wrc-1750gsv Firmware Version <= 2.11
Elecom ≫ Wrc-1900gst Firmware Version <= 1.03
Elecom ≫ Wrc-2533gst Firmware Version <= 1.03
Elecom ≫ Wrc-2533gst2 Firmware Version <= 1.25
Elecom ≫ Wrc-2533gsta Firmware Version <= 1.03
Elecom ≫ Wrc-2533gst2sp Firmware Version <= 1.25
Elecom ≫ Wrc-2533gst2-g Firmware Version <= 1.25
Elecom ≫ Edwrc-2533gst2 Firmware Version <= 1.25
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.09% | 0.269 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.