TITLE:
Dell TrueMobile Wireless Router Authentication Bypass Vulnerability

SECUNIA ADVISORY ID:
SA17936

VERIFY ADVISORY:
http://secunia.com/advisories/17936/

CRITICAL:
Less critical

IMPACT:
Security Bypass

WHERE:
>From local network

SOFTWARE:
Dell TrueMobile 2300 Wireless Broadband Router
http://secunia.com/product/6399/

DESCRIPTION:
TNull has reported a vulnerability in Dell TrueMobile Wireless
Broadband Router, which can be exploited by malicious people to
bypass certain security restrictions.

The vulnerability is caused due to an access control error in the
"apply.cgi" page of the router's web management interface. This can
be exploited to reset the authentication credentials by accessing the
affected page directly.

Example:
http://[router]/apply.cgi?Page=adv_password.asp&action=ClearLog

The vulnerability has been reported in Dell TrueMobile 2300 firmware
versions 3.0.0.8 and 5.1.1.6.

SOLUTION:
The product has reportedly been discontinued and a patch will not be
issued.

PROVIDED AND/OR DISCOVERED BY:
TNull

ORIGINAL ADVISORY:
iDEFENSE:
http://www.idefense.com/application/poi/display?id=348&type=vulnerabilities

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------