Multiple cross-site request forgery (CSRF) vulnerabilities in goform/RgDdns in ARRIS (formerly Motorola) SBG901 SURFboard Wireless Cable Modem allow remote attackers to hijack the authentication of administrators for requests that (1) change the dns service via the DdnsService parameter, (2) change the username via the DdnsUserName parameter, (3) change the password via the DdnsPassword parameter, or (4) change the host name via the DdnsHostName parameter.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.exploit-db.com/exploits/33792 | Exploit | 
| http://www.exploit-db.com/exploits/33792 | Exploit | 
Configurations
                    History
                    21 Nov 2024, 02:08
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.exploit-db.com/exploits/33792 - Exploit | 
23 Aug 2021, 17:24
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:h:commscope:arris_sbg901:-:*:*:*:*:*:*:* | 
Information
                Published : 2014-06-19 14:55
Updated : 2025-04-12 10:46
NVD link : CVE-2014-3778
Mitre link : CVE-2014-3778
CVE.ORG link : CVE-2014-3778
JSON object : View
Products Affected
                commscope
- arris_sbg901
 
CWE
                
                    
                        
                        CWE-352
                        
            Cross-Site Request Forgery (CSRF)
