CVE-2011-0746

Cross-site request forgery (CSRF) vulnerability in Forms/PortForwarding_Edit_1 on the ZyXEL O2 DSL Router Classic allows remote attackers to hijack the authentication of administrators for requests that insert cross-site scripting (XSS) sequences via the PortRule_Name parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:h:zyxel:o2_dsl_router_classic:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:24

Type Values Removed Values Added
References () http://int21.de/cve/CVE-2011-0746-o2-router.html - Exploit () http://int21.de/cve/CVE-2011-0746-o2-router.html - Exploit
References () http://securityreason.com/securityalert/8198 - () http://securityreason.com/securityalert/8198 -
References () http://www.securityfocus.com/archive/1/517399/100/0/threaded - () http://www.securityfocus.com/archive/1/517399/100/0/threaded -

Information

Published : 2011-04-13 14:55

Updated : 2024-11-21 01:24


NVD link : CVE-2011-0746

Mitre link : CVE-2011-0746

CVE.ORG link : CVE-2011-0746


JSON object : View

Products Affected

zyxel

  • o2_dsl_router_classic
CWE
CWE-352

Cross-Site Request Forgery (CSRF)