Multiple cross-site request forgery (CSRF) vulnerabilities in the management interface on the A-LINK WL54AP3 and WL54AP2 access points before firmware 1.4.2-eng1 allow remote attackers to hijack the authentication of administrators for requests that (1) modify the network configuration via certain parameters to goform/formWanTcpipSetup or (2) modify credentials via certain parameters to goform/formPasswordSetup.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wl54ap2 | A-link | * | 1.4.1 (including) |
Wl54ap2 | A-link | 1.2.0 (including) | 1.2.0 (including) |
Wl54ap2 | A-link | 1.2.1 (including) | 1.2.1 (including) |
Wl54ap2 | A-link | 1.2.2 (including) | 1.2.2 (including) |
Wl54ap2 | A-link | 1.2.3 (including) | 1.2.3 (including) |
Wl54ap2 | A-link | 1.2.4 (including) | 1.2.4 (including) |
Wl54ap2 | A-link | 1.2.5 (including) | 1.2.5 (including) |
Wl54ap2 | A-link | 1.2.6 (including) | 1.2.6 (including) |
Wl54ap2 | A-link | 1.2.7 (including) | 1.2.7 (including) |
Wl54ap2 | A-link | 1.2.8 (including) | 1.2.8 (including) |
Wl54ap2 | A-link | 1.2.9 (including) | 1.2.9 (including) |
Wl54ap2 | A-link | 1.4.0 (including) | 1.4.0 (including) |