Comcast DOCSIS 3.0 Business Gateways Cross Site Request Forgery and Security Bypass Vulnerabilities

An attacker can exploit these issues through a browser. To exploit the cross-site request-forgery issue, the attacker must entice an unsuspecting victim into following a malicious URI.

The following example proof-of-concepts are available:


 

Privacy Statement
Copyright 2010, SecurityFocus