Vulnerability Details : CVE-2010-4507
Multiple cross-site request forgery (CSRF) vulnerabilities on the iSpot 2.0.0.0 R1679, and the ClearSpot 2.0.0.0 R1512 and R1786, with firmware 1.9.9.4 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the cmd parameter in an act_cmd_result action to webmain.cgi, (2) enable remote management via an enable_remote_access act_network_set action to webmain.cgi, (3) enable the TELNET service via an ENABLE_TELNET act_set_wimax_etc_config action to webmain.cgi, (4) enable TELNET sessions via a certain act_network_set action to webmain.cgi, or (5) read arbitrary files via the FILE_PATH parameter in an act_file_download action to upgrademain.cgi.
Vulnerability category: Cross-site request forgery (CSRF)
Exploit prediction scoring system (EPSS) score for CVE-2010-4507
Probability of exploitation activity in the next 30 days: 0.56%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 75 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-4507
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2010-4507
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-4507
-
http://www.exploit-db.com/exploits/15728/
Clear iSpot/Clearspot 2.0.0.0 - Cross-Site Request Forgery - Hardware webapps ExploitExploit
-
https://www.trustwave.com/spiderlabs/advisories/TWSL2010-008.txt
404 Not Found | TrustwaveExploit
Products affected by CVE-2010-4507
- cpe:2.3:a:clear:ispot_firmware:1.9.9.4:*:*:*:*:*:*:*
- cpe:2.3:h:clear:ispot:2.0.0.0:r1679:*:*:*:*:*:*
- cpe:2.3:a:clear:clearspot_firmware:1.9.9.4:*:*:*:*:*:*:*
- cpe:2.3:h:clear:clearspot:2.0.0.0:r1512:*:*:*:*:*:*
- cpe:2.3:h:clear:clearspot:2.0.0.0:r1786:*:*:*:*:*:*