Vulnerability Details : CVE-2007-5383
The Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allows remote attackers on an intranet to bypass authentication and gain administrative access via vectors including a '/' (slash) character at the end of the PATH_INFO to cgi/b, aka "double-slash auth bypass." NOTE: remote attackers outside the intranet can exploit this by leveraging a separate CSRF vulnerability. NOTE: SpeedTouch 780 might also be affected by some of these issues.
Vulnerability category: Cross-site request forgery (CSRF)BypassGain privilege
Products affected by CVE-2007-5383
- cpe:2.3:h:alcatel:speedtouch_7g_router:*:*:*:*:*:*:*:*
- cpe:2.3:h:bt:home_hub:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-5383
15.51%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-5383
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2007-5383
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-5383
-
http://www.securityfocus.com/archive/1/489009/100/0/threaded
-
http://www.gnucitizen.org/projects/router-hacking-challenge/
Page not found ยท GitHub Pages
-
http://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-1/
Exploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41271
-
http://securityreason.com/securityalert/3213
-
http://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub
-
http://www.theregister.co.uk/2007/10/09/bt_home_hub_vuln/
-
http://www.securityfocus.com/bid/25972
Exploit
-
http://www.securityfocus.com/archive/1/481835/100/0/threaded
Jump to