Multiple cross-site request forgery (CSRF) vulnerabilities on the TP-LINK WR1043N router with firmware TL-WR1043ND_V1_120405 allow remote attackers to hijack the authentication of administrators for requests that (1) enable FTP access (aka "FTP directory traversal") to /tmp via the shareEntire parameter to userRpm/NasFtpCfgRpm.htm, (2) change the FTP administrative password via the nas_admin_pwd parameter to userRpm/NasUserAdvRpm.htm, (3) enable FTP on the WAN interface via the internetA parameter to userRpm/NasFtpCfgRpm.htm, (4) launch the FTP service via the startFtp parameter to userRpm/NasFtpCfgRpm.htm, or (5) enable or disable bandwidth limits via the QoSCtrl parameter to userRpm/QoSCfgRpm.htm.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2014-10-06T01:00:00
Updated: 2014-10-06T00:57:00
Reserved: 2013-03-22T00:00:00
Link: CVE-2013-2645
JSON object: View
NVD Information
Status : Analyzed
Published: 2014-10-06T01:55:07.727
Modified: 2014-10-06T18:50:36.540
Link: CVE-2013-2645
JSON object: View
Redhat Information
No data.
CWE