+--------------------------------------------------------------------------------------------------------------------------------+ # Exploit Title : Sitecom WLM-2501 new Multiple CSRF Vulnerabilities # Date : 22-03-2012 # Author : Ivano Binetti (http://www.ivanobinetti.com) # Vendor site : http://www.sitecom.com/wireless-modem-router-300n/p/859 # Version : WLM-2501 # Tested on : WLM-2501 (All Sitecom WL series might be is affected by these vulnerabilities) # Original Advisory: http://www.webapp-security.com/?p=75 +--------------------------------------------------------------------------------------------------------------------------------+ 1)Introduction 2)Vulnerability Description 3)Exploit 3.1 Disable Mac Filtering 3.2 Disable IP/Port Filtering 3.3 Disable Port Forwarding 3.4 Disable Wireless Access Control 3.5 Disable Wi-Fi Protected Setup 3.6 Disable URL Blocking Filter 3.7 Disable Domain Blocking Filter 3.8 Disable IP Address ACL Filter +--------------------------------------------------------------------------------------------------------------------------------+ 1)Introduction Sitecom WLM-2501 is a Wireless Modem Router 300N which uses a web management interface - listening to default on tcp/ip port 80 - and "admin" as default administrator. His default ip address is 192.168.0.1. 2)Vulnerability Description The web interface of this router is affected by multiple CSRF vulnerabilities which allows to change the following router's parameters: - Disable Mac Filtering - Disable/Modify IP/Port Filtering - Disable/Modify Port Forwarding - Disable/Modify Wireless Access Control - Disable Wi-Fi Protected Setup - Disable/Modify URL Blocking Filter - Disable/Modify Domain Blocking Filter - Disable/Modify IP Address ACL - Change Wireless Passphrase - Enable/Modify Remote Access (also on WAN interface) 3)Exploit 3.1 Disable Mac Filtering

CSRF Exploit

3.2 Disable IP/Port Filtering

CSRF Exploit

3.3 Disable Port Forwarding

CSRF Exploit

3.4 Disable Wireless Access Control

CSRF Exploit

3.5 Disable Wi-Fi Protected Setup

CSRF Exploit

3.6 Disable URL Blocking Filter

CSRF Exploit

3.7 Disable Domain Blocking Filter

CSRF Exploit

3.8 Disable IP Address ACL Filter

CSRF Exploit

+--------------------------------------------------------------------------------------------------------------------------------+