CVE-2026-36960
Received Received - Intake
Cross-Site Request Forgery in U-SPEED N300 Router

Publication date: 2026-04-30

Last updated on: 2026-04-30

Assigner: MITRE

Description
A Cross-Site Request Forgery (CSRF) vulnerability exists in the web management interface of the U-SPEED N300 Rounter V1.0.0. The device does not implement CSRF protection mechanisms such as anti-CSRF tokens or strict Origin/Referer validation for administrative API endpoints. An attacker can craft a malicious webpage that sends forged HTTP requests to configuration endpoints. If an authenticated administrator visits the malicious webpage, the victim's browser automatically includes the valid session cookie in the request, allowing the router to process the request as a legitimate administrative action.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-04-30
Generated
2026-05-07
AI Q&A
2026-04-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
u-speed n300_router 1.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-36960 is a Cross-Site Request Forgery (CSRF) vulnerability in the web management interface of the U-SPEED N300 Router version V1.0.0.

The router does not implement CSRF protection mechanisms such as anti-CSRF tokens or strict validation of Origin and Referer headers for its administrative API endpoints.

An attacker can create a malicious webpage that sends forged HTTP requests to the router's configuration endpoints.

If an authenticated administrator visits this malicious webpage, their browser automatically includes the valid session cookie, causing the router to process the forged requests as legitimate administrative actions.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to perform unauthorized administrative actions on the router without the administrator's consent.

  • Change wireless network settings such as WiFi name and password.
  • Modify Telnet service settings.
  • Alter other critical administrative configurations.

Such unauthorized changes can compromise the confidentiality, integrity, and availability of the network managed by the router.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring HTTP requests to the router's administrative API endpoints, especially those that change configuration such as /api/setWlan or /api/telnet.

You can use network traffic analysis tools like tcpdump or Wireshark to capture and inspect HTTP requests sent to the router's management interface.

  • Use tcpdump to capture HTTP traffic to the router's IP address: tcpdump -i <interface> host <router_ip> and port 80
  • Inspect captured HTTP requests for POST requests to endpoints like /api/setWlan or /api/telnet that do not include anti-CSRF tokens or proper Origin/Referer headers.
  • Use curl commands to manually test if the router accepts state-changing requests without CSRF tokens or Origin/Referer validation, for example: curl -X POST http://<router_ip>/api/setWlan -d '{"ssid":"test"}' -b 'session_cookie'

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the router's web management interface to trusted networks and users only.

Avoid visiting untrusted or suspicious websites while logged in as an administrator to the router.

If possible, disable remote management features temporarily to reduce exposure.

Request or apply firmware updates from the vendor that implement anti-CSRF tokens, strict Origin/Referer header validation, and use the SameSite=Strict cookie attribute.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthorized administrative actions on the router by exploiting the lack of CSRF protections, which can lead to unauthorized access and modification of network configurations.

Such unauthorized access and potential compromise of network devices can result in violations of common security requirements found in standards and regulations like GDPR and HIPAA, which mandate protection of data confidentiality, integrity, and availability.

Failure to implement adequate security controls like CSRF protection mechanisms may lead to non-compliance with these regulations, as they require organizations to safeguard systems against unauthorized access and ensure secure management of network infrastructure.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart