MISC: 2Wire DSL Router Vulnerability

This signature detects attempts to exploit a known vulnerability in 2Wire DSL routers. An attacker can create a malicious Web site containing dangerous hyperlinks, which if accessed by a victim, allows the attacker to gain control of the victim's DSL router.

Extended Description

Multiple 2Wire routers are prone to an access-validation vulnerability because they fail to adequately authenticate users before performing certain actions. Unauthenticated attackers can leverage this issue to change the password of arbitrary user accounts on the router. Successful attacks will completely compromise affected devices. 2Wire routers that have the 'H04_POST' page are affected by this issue. UPDATE: This BID has been retired because it has been found to be a duplicate of BID 27246 (2Wire Routers Cross-Site Request Forgery Vulnerability). UPDATE (February 1, 2008): This BID is being reinstated. Further investigation and new information reveal that this vulnerability differs from the one described in BID 27246.

Affected Products

2wire 3800_hgv-b

References

BugTraq: 27516

Short Name
APP:2WIRE-DSL-VULN
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
2Wire DSL Router Vulnerability bid:27516
Release Date
04/09/2008
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

2wire

Found a potential security threat?