Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in Forms/PortForwarding_Edit_1 on the ZyXEL O2 DSL Router Classic allows remote attackers to hijack the authentication of administrators for requests that insert cross-site scripting (XSS) sequences via the PortRule_Name parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zyxel | O2 Dsl Router Classic | All versions |
Related Weaknesses (CWE)
References
- http://int21.de/cve/CVE-2011-0746-o2-router.htmlExploit
- http://securityreason.com/securityalert/8198
- http://www.securityfocus.com/archive/1/517399/100/0/threaded
- http://int21.de/cve/CVE-2011-0746-o2-router.htmlExploit
- http://securityreason.com/securityalert/8198
- http://www.securityfocus.com/archive/1/517399/100/0/threaded
FAQ
What is CVE-2011-0746?
CVE-2011-0746 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cross-site request forgery (CSRF) vulnerability in Forms/PortForwarding_Edit_1 on the ZyXEL O2 DSL Router Classic allows remote attackers to hijack the authentication of administrators for requests th...
How severe is CVE-2011-0746?
CVE-2011-0746 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0746?
Check the references section above for vendor advisories and patch information. Affected products include: Zyxel O2 Dsl Router Classic.