Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the ASUS RT-G32 routers with firmware 2.0.2.6 and 2.0.3.2 allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via a request to start_apply.htm.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asus | Rt-G32 Firmware | 2.0.2.6 |
| Asus | Rt-G32 | All versions |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/130724/ASUS-RT-G32-Cross-Site-Request-ForgeExploit
- http://seclists.org/fulldisclosure/2015/Mar/42Exploit
- http://websecurity.com.ua/7644/Exploit
- http://www.securityfocus.com/bid/73294
- http://packetstormsecurity.com/files/130724/ASUS-RT-G32-Cross-Site-Request-ForgeExploit
- http://seclists.org/fulldisclosure/2015/Mar/42Exploit
- http://websecurity.com.ua/7644/Exploit
- http://www.securityfocus.com/bid/73294
FAQ
What is CVE-2015-2676?
CVE-2015-2676 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Cross-site request forgery (CSRF) vulnerability in the ASUS RT-G32 routers with firmware 2.0.2.6 and 2.0.3.2 allows remote attackers to hijack the authentication of administrators for requests that ch...
How severe is CVE-2015-2676?
CVE-2015-2676 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-2676?
Check the references section above for vendor advisories and patch information. Affected products include: Asus Rt-G32 Firmware, Asus Rt-G32.