CVE-2026-29521
CSRF Vulnerability in Hereta ETH-IMC408M Firmware Allows Configuration Tampering
Publication date: 2026-03-16
Last updated on: 2026-04-10
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hereta | eth-imc408m_firmware | to 1.0.15 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'The Hereta ETH-IMC408M device, specifically firmware version 1.0.15 and earlier, contains a Cross-Site Request Forgery (CSRF) vulnerability in its setup.cgi configuration interface.'}, {'type': 'paragraph', 'content': "This vulnerability exists because the device lacks proper CSRF protections, allowing attackers to host malicious web pages that submit forged requests using the device's automatically-included HTTP Basic Authentication credentials."}, {'type': 'paragraph', 'content': 'As a result, attackers can perform unauthorized actions such as adding RADIUS accounts, changing network settings, or triggering diagnostic functions on the device.'}] [1]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': "This vulnerability can lead to unauthorized modification of your device's configuration without your consent."}, {'type': 'list_item', 'content': 'Attackers can add unauthorized RADIUS accounts, potentially allowing them to access network resources.'}, {'type': 'list_item', 'content': 'They can alter network settings, which might disrupt your network connectivity or security.'}, {'type': 'list_item', 'content': 'Attackers can trigger diagnostic functions, possibly causing device instability or revealing sensitive information.'}, {'type': 'paragraph', 'content': 'Overall, this can compromise the security and reliability of your network device.'}] [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability involves unauthorized configuration changes via the setup.cgi interface on Hereta ETH-IMC408M devices running firmware version 1.0.15 or earlier. Detection can focus on monitoring HTTP requests to the setup.cgi endpoint for suspicious or unexpected POST requests that attempt to modify device settings.'}, {'type': 'paragraph', 'content': 'You can detect potential exploitation attempts by capturing and analyzing network traffic for HTTP requests targeting setup.cgi with parameters related to configuration changes, especially those including HTTP Basic Authentication headers.'}, {'type': 'paragraph', 'content': 'Suggested commands to help detect this vulnerability include using network traffic analysis tools such as tcpdump or Wireshark to filter HTTP requests to setup.cgi. For example:'}, {'type': 'list_item', 'content': "tcpdump -i <interface> -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'setup.cgi'"}, {'type': 'list_item', 'content': 'Use curl or wget to test the setup.cgi endpoint manually to see if CSRF protections are missing, for example: curl -v --user <username>:<password> http://<device-ip>/setup.cgi'}, {'type': 'paragraph', 'content': 'Additionally, reviewing device logs for unexpected configuration changes or access attempts to setup.cgi can help identify exploitation.'}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'To mitigate this vulnerability immediately, you should restrict access to the setup.cgi interface to trusted users and networks only, minimizing exposure to potential attackers.'}, {'type': 'paragraph', 'content': "Implement network-level protections such as firewall rules to block unauthorized access to the device's web interface."}, {'type': 'paragraph', 'content': 'Ensure that users are aware of the risk of CSRF attacks and avoid visiting untrusted or malicious web pages while authenticated to the device.'}, {'type': 'paragraph', 'content': 'If possible, update the device firmware to a version that addresses this vulnerability or contact the vendor for patches or workarounds.'}] [1]