CVE-2026-36956
Analyzed Analyzed - Analysis Complete
CSRF in Dbit N300 T1 Pro Router

Publication date: 2026-04-30

Last updated on: 2026-05-05

Assigner: MITRE

Description
A Cross-Site Request Forgery (CSRF) vulnerability exists in the web management interface of the Dbit N300 T1 Pro wireless router V1.0.0. The router fails to implement proper CSRF protection mechanisms such as anti-CSRF tokens or strict Origin/Referer validation for administrative API endpoints. An attacker can craft a malicious webpage that sends forged HTTP requests to configuration endpoints such as /api/setWlan. If an authenticated administrator visits the malicious webpage, the victim's browser automatically includes the valid session cookie in the request, allowing the router to process the request as a legitimate administrative action.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-04-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dbitnet dbit_n300_t1_pro_firmware 1.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-36956 is a Cross-Site Request Forgery (CSRF) vulnerability in the web management interface of the Dbit N300 T1 Pro wireless router firmware version V1.0.0. The router does not implement proper CSRF protection mechanisms such as anti-CSRF tokens or strict Origin/Referer header validation on its administrative API endpoints.

An attacker can create a malicious webpage that sends forged HTTP requests to configuration endpoints like /api/setWlan. If an authenticated administrator visits this malicious webpage, their browser automatically includes the valid session cookie, causing the router to process the forged request as a legitimate administrative action.


How can this vulnerability impact me? :

This vulnerability can have significant impacts because it allows an attacker to perform unauthorized administrative actions on the router without the administrator's consent.

  • Modify WiFi SSID and password, potentially disrupting network access or enabling unauthorized network entry.
  • Change WAN and DNS configurations, which could redirect traffic or disrupt internet connectivity.
  • Take full control over the router, compromising confidentiality, integrity, and availability of the network device.

The vulnerability has a high CVSS v3.1 score of 8.8, indicating a high risk due to its network-based attack vector, low complexity, and severe impact.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring HTTP requests to the router's administrative API endpoints such as /api/setWlan, /api/setWan, and /api/setSystem for suspicious or unauthorized POST requests.

You can use network traffic analysis tools like tcpdump or Wireshark to capture and inspect HTTP requests targeting these endpoints.

  • Use tcpdump to capture HTTP POST requests to the router's IP address on port 80 or 443: tcpdump -i <interface> host <router_ip> and port 80 or 443 and tcp[32:4] = 0x504f5354 (which corresponds to 'POST')
  • Use curl or similar tools to manually test if the router accepts POST requests to /api/setWlan without CSRF tokens or Origin/Referer validation.

Detection involves verifying if the router processes POST requests to these endpoints without requiring anti-CSRF tokens or validating the Origin/Referer headers.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the router's web management interface to trusted networks and users only.

Avoid visiting untrusted or suspicious websites while logged into the router's administrative interface to prevent CSRF attacks.

If possible, disable remote management features temporarily until a firmware update is applied.

Apply any available firmware updates from Shenzhen Dibit Network Equipment Co., Ltd. that implement anti-CSRF tokens, strict Origin/Referer header validation, and use the SameSite=Strict cookie attribute.

Consider changing administrative passwords and monitoring router configurations for unauthorized changes.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This Cross-Site Request Forgery (CSRF) vulnerability in the Dbit N300 T1 Pro wireless router allows unauthorized administrative actions, potentially leading to unauthorized access and modification of sensitive network configurations.

Such unauthorized access and changes can compromise the confidentiality, integrity, and availability of data and network resources, which are critical requirements under common standards and regulations like GDPR and HIPAA.

Failure to protect administrative interfaces against CSRF attacks may result in non-compliance with these regulations, as they mandate appropriate security controls to prevent unauthorized access and protect personal and sensitive data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart