Description
An exploitable Cross-Site Request Forgery vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted form can trick a client into making an unintentional request to the web server which will be treated as an authentic request.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-9557 | An exploitable Cross-Site Request Forgery vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted form can trick a client into making an unintentional request to the web server which will be treated as an authentic request. |
References
| Link | Providers |
|---|---|
| http://www.talosintelligence.com/reports/TALOS-2016-0232/ |
|
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-06T02:27:41.285Z
Reserved: 2016-10-17T00:00:00.000Z
Link: CVE-2016-8718
No data.
Status : Deferred
Published: 2017-04-12T19:59:00.193
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-8718
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD