Impact
A legitimate user’s session can be tricked into sending requests that alter device state. The flaw resides in an undocumented function that accepts authenticated commands without proper CSRF safeguards. Attackers can launch this remotely by sending crafted requests from any webpage. The weakness is manifested as a classic CSRF attack (CWE‑352) and is compounded by missing access‑control checks (CWE‑862), allowing changes that should only be available to privileged users.
Affected Systems
Technostrobe HI‑LED‑WR120‑G2 devices running firmware version 5.5.0.1R6.03.30 are affected. No other vendors or products are listed as impacted.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. Exploitability is possible from a remote host, and public exploit code is available. The vulnerability is not yet catalogued in CISA’s KEV list, but the lack of vendor response raises concern. The potential impact ranges from unauthorized configuration changes to full device compromise if additional higher‑privilege flaws exist. Monitoring for anomalous request patterns and applying any available firmware update are recommended to reduce risk.
OpenCVE Enrichment