CVE-2026-27518
Received Received - Intake
CSRF Vulnerability in Binardat 10G08-0800GSM Switch Firmware

Publication date: 2026-02-24

Last updated on: 2026-02-25

Assigner: VulnCheck

Description
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior lack CSRF protections for state-changing actions in the administrative interface. An attacker can trick an authenticated administrator into performing unauthorized configuration changes.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-24
Last Modified
2026-02-25
Generated
2026-05-07
AI Q&A
2026-02-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
binardat 10g08-0800gsm_firmware to V300SP10260209 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-27518 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and earlier.

The vulnerability exists because these firmware versions lack CSRF protections for state-changing actions in the administrative interface.

This flaw allows an attacker to trick an authenticated administrator into unknowingly performing unauthorized configuration changes on the network switch.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can cause an authenticated administrator to make unauthorized configuration changes to the network switch.

Such unauthorized changes could potentially disrupt network operations or weaken network security controls.

The CVSS v4 base score of 5.1 indicates a medium severity with low impact on integrity and no impact on confidentiality or availability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

The vulnerability exists because the Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior lack CSRF protections for state-changing actions in the administrative interface.

To mitigate this vulnerability, immediate steps should include avoiding or restricting access to the administrative interface from untrusted networks and ensuring that administrators do not interact with untrusted web content while authenticated to the device.

Additionally, updating the firmware to a version that includes CSRF protections, if available, would be a recommended long-term mitigation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart