Description
Tenda W308R v2 V5.07.48 contains a cookie session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting insufficient session validation. Attackers can send GET requests to the goform/AdvSetDns endpoint with a crafted admin language cookie to change DNS servers and redirect user traffic to malicious sites.
Problem types
Authentication Bypass by Spoofing
Product status
References
www.exploit-db.com/exploits/44373 (ExploitDB-44373)
www.vulncheck.com/...r-v2-cookie-session-weakness-dns-change (VulnCheck Advisory: Tenda W308R v2 V5.07.48 Cookie Session Weakness DNS Change)