diff --git a/files.csv b/files.csv index 069d00c41..c7b4d7a46 100755 --- a/files.csv +++ b/files.csv @@ -29691,3 +29691,4 @@ id,file,description,date,author,platform,type,port 32940,platforms/java/webapps/32940.txt,"Sun Java System Delegated Administrator 6.x HTTP Response Splitting Vulnerability",2009-04-21,"SCS team",java,webapps,0 32941,platforms/php/webapps/32941.txt,"PTCeffect 4.6 - LFI & SQL Injection Vulnerabilities",2014-04-19,"walid naceri",php,webapps,0 32942,platforms/linux/remote/32942.txt,"Mozilla Multiple Products Server Refresh Header XSS",2009-04-22,"Olli Pettay",linux,remote,0 +32943,platforms/hardware/webapps/32943.txt,"Teracom Modem T2-B-Gawv1.4U10Y-BI - CSRF Vulnerability",2014-04-20,"Rakesh S",hardware,webapps,0 diff --git a/platforms/hardware/webapps/32943.txt b/platforms/hardware/webapps/32943.txt new file mode 100755 index 000000000..73cdf9548 --- /dev/null +++ b/platforms/hardware/webapps/32943.txt @@ -0,0 +1,12 @@ +# Exploit Title: Teracom Modem CSRF Vulnerability +# Date: 20-04-2014 +# Author: Rakesh S +# Software Link: http://www.teracom.in/ +# Version:  T2-B-Gawv1.4U10Y-BI + +The vulnerability exists due to insufficient validation of HTTP request origin. A remote attacker can trick a logged-in administrator to visit a specially crafted webpage to change SSID and its password. +  +The exploitation example below changes password for the SSID: +  +  +Submit \ No newline at end of file