Description
|
|
(|Several vulnerabilities have been identified in Cisco EPC 3925:|- HTTP Response Injection via 'Lang' Cookie||- modem crash via 'Lang' Cookie||- modem crash in Wireless Client List via 'h_sortWireless'||- unauthorized user can edit device channel settings and restart the modem||- cross-site request forgery, allowing a remote attacker to change admin credentials or enable remote management by enticing the victim into following a specially crafted link||- stored cross-site scripting in SMTP Settings (Administration -> Reporting)||- stored cross-site scripting in User Name #1 (e.g Administration -> Management / Setup -> Quick Setup)||- stored cross-site scripting in User Name #2 (Access Restrictions -> User Setup)||- stored cross-site scripting in ToD Filter (Access Restrictions -> Time of Day Rules)||- stored cross-site scripting in Rule Name (Access Restrictions -> Basic Rules)||- stored cross-site scripting in Domain Name (Access Restrictions -> Basic Rules)||- stored cross-site scripting in Network Name (e.g Wireless -> Basic Settings)||- stored cross-site scripting in DDNS Settings (Setup -> DDNS)||- stored cross-site scripting in Advanced VPN Setup (Security -> VPN -> Advanced Settings).||Proofs of concept are available.)
|