CVE-2019-696721.03.2019, 16:01AirTies Air5341 1.0.0.12 devices allow cgi-bin/login CSRF.CSRFEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST8.8 HIGHNETWORKLOWNONECVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HmitreCNA------CVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 72%VendorProductVersionairtiesair_5341_firmware1.0.0.12𝑥= Vulnerable software versionsKnown Exploits!http://packetstormsecurity.com/files/151372/AirTies-Air5341-Modem-1.0.0.12-Cross-Site-Request-Forgery.htmlhttps://www.exploit-db.com/exploits/46253/http://packetstormsecurity.com/files/151372/AirTies-Air5341-Modem-1.0.0.12-Cross-Site-Request-Forgery.htmlhttps://www.exploit-db.com/exploits/46253/Common Weakness EnumerationCWE-352 - Cross-Site Request Forgery (CSRF)The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Referenceshttp://packetstormsecurity.com/files/151372/AirTies-Air5341-Modem-1.0.0.12-Cross-Site-Request-Forgery.htmlhttps://alicangonullu.biz/konu/3https://twitter.com/alicangonulluhttps://www.exploit-db.com/exploits/46253/http://packetstormsecurity.com/files/151372/AirTies-Air5341-Modem-1.0.0.12-Cross-Site-Request-Forgery.htmlhttps://alicangonullu.biz/konu/3https://twitter.com/alicangonulluhttps://www.exploit-db.com/exploits/46253/