The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 contains multiple CSRF vulnerabilities within its web management portal. Attackers can, for example, use this to update the TR-069 configuration server settings (responsible for managing devices remotely). This makes it possible to remotely reboot the device or upload malicious firmware.
                
            References
                    | Link | Resource | 
|---|---|
| https://6point6.co.uk/insights/security-advisory-relish-4g-hub-vh510/ | Third Party Advisory | 
| https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf | Exploit Third Party Advisory | 
| https://6point6.co.uk/insights/security-advisory-relish-4g-hub-vh510/ | Third Party Advisory | 
| https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2020-11-04 21:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27692
Mitre link : CVE-2020-27692
CVE.ORG link : CVE-2020-27692
JSON object : View
Products Affected
                imomobile
- verve_connect_vh510_firmware
 - verve_connect_vh510
 
CWE
                
                    
                        
                        CWE-352
                        
            Cross-Site Request Forgery (CSRF)
