Impact
A flaw in the device’s configuration web interface allows attackers to perform cross‑site request forgery because the setup.cgi script lacks protection. The vulnerability enables unauthorized modification of device settings, including the addition of RADIUS accounts, changes to network parameters, or triggering diagnostic procedures. This weakness is classified as a CSRF issue and directly compromises the integrity of the device configuration.
Affected Systems
The affected product is the Hereta ETH‑IMC408M network device produced by Shenzhen Hereta Technology Co., Ltd. firmware version 1.0.15 and all earlier releases are vulnerable.
Risk and Exploitability
With a CVSS score of 5.1 the risk is moderate, and the EPSS score of less than 1% indicates that exploitation is unlikely. The flaw is not listed in CISA’s KEV catalog. Attackers would need to persuade a user to visit a malicious web page that auto‑submits requests using the device’s HTTP Basic Authentication credentials, suggesting a browser‑based attack vector that does not require driver or privilege escalation.
OpenCVE Enrichment