CVE-2023-47677: CWE-352: Cross-Site Request Forgery (CSRF) in LevelOne WBR-6013
A cross-site request forgery (csrf) vulnerability exists in the boa CSRF protection functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted network request can lead to CSRF. An attacker can send an HTTP request to trigger this vulnerability.
AI Analysis
Technical Summary
CVE-2023-47677 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the LevelOne WBR-6013 wireless router, specifically in the boa CSRF protection mechanism of the Realtek rtl819x Jungle SDK version 3.4.11 firmware (RER4_A_v3411b_2T2R_LEV_09_170623). CSRF vulnerabilities allow attackers to trick authenticated users into submitting unauthorized commands to a web application or device without their consent. In this case, the vulnerability arises because the CSRF protection implemented in the boa web server component is insufficient, enabling an attacker to craft a malicious HTTP request that the router processes as legitimate. The attack vector is network-based and requires the victim to interact with a malicious webpage or link that sends the crafted request to the router's web interface. No authentication is required for the attacker to send the request, but user interaction is necessary to trigger the exploit. The vulnerability affects confidentiality, integrity, and availability (CIA) of the device, as an attacker could change router settings, redirect traffic, or cause denial of service. The CVSS v3.1 score is 8.8 (high), reflecting the ease of exploitation (network accessible, no privileges required) and the severe impact on the device. Currently, no patches or official fixes have been published, and no known exploits are observed in the wild. The vulnerability is tracked under CWE-352, which is a common web security weakness related to CSRF attacks. The affected product is primarily used in small office/home office (SOHO) environments but may also be deployed in enterprise branch offices.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromise of the LevelOne WBR-6013 router could lead to unauthorized configuration changes, interception or redirection of network traffic, and potential denial of service, impacting both confidentiality and availability of internal communications. Organizations relying on these routers for critical connectivity or as part of their network perimeter defenses could face data breaches or network outages. The vulnerability's ease of exploitation from the network without authentication increases the attack surface, especially in environments where remote management interfaces are exposed or where users may be tricked into visiting malicious websites. This risk is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government institutions across Europe. Additionally, the lack of available patches means organizations must rely on compensating controls until a fix is released, increasing exposure time.
Mitigation Recommendations
1. Immediately disable remote management interfaces on the LevelOne WBR-6013 routers to prevent external access to the web interface. 2. Segment the network to isolate vulnerable devices from untrusted networks, limiting exposure to potential attackers. 3. Implement strict web filtering and DNS filtering to block access to known malicious sites that could host CSRF attack vectors. 4. Educate users about the risks of clicking on untrusted links or visiting suspicious websites, reducing the likelihood of triggering CSRF attacks. 5. Monitor router logs and network traffic for unusual HTTP requests or configuration changes indicative of exploitation attempts. 6. Where possible, replace affected devices with models that have updated firmware or confirmed patches addressing this vulnerability. 7. If replacement is not immediately feasible, consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) that can detect and block CSRF attack patterns targeting the router's management interface. 8. Stay informed about vendor advisories and apply firmware updates promptly once patches become available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2023-47677: CWE-352: Cross-Site Request Forgery (CSRF) in LevelOne WBR-6013
Description
A cross-site request forgery (csrf) vulnerability exists in the boa CSRF protection functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted network request can lead to CSRF. An attacker can send an HTTP request to trigger this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2023-47677 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the LevelOne WBR-6013 wireless router, specifically in the boa CSRF protection mechanism of the Realtek rtl819x Jungle SDK version 3.4.11 firmware (RER4_A_v3411b_2T2R_LEV_09_170623). CSRF vulnerabilities allow attackers to trick authenticated users into submitting unauthorized commands to a web application or device without their consent. In this case, the vulnerability arises because the CSRF protection implemented in the boa web server component is insufficient, enabling an attacker to craft a malicious HTTP request that the router processes as legitimate. The attack vector is network-based and requires the victim to interact with a malicious webpage or link that sends the crafted request to the router's web interface. No authentication is required for the attacker to send the request, but user interaction is necessary to trigger the exploit. The vulnerability affects confidentiality, integrity, and availability (CIA) of the device, as an attacker could change router settings, redirect traffic, or cause denial of service. The CVSS v3.1 score is 8.8 (high), reflecting the ease of exploitation (network accessible, no privileges required) and the severe impact on the device. Currently, no patches or official fixes have been published, and no known exploits are observed in the wild. The vulnerability is tracked under CWE-352, which is a common web security weakness related to CSRF attacks. The affected product is primarily used in small office/home office (SOHO) environments but may also be deployed in enterprise branch offices.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromise of the LevelOne WBR-6013 router could lead to unauthorized configuration changes, interception or redirection of network traffic, and potential denial of service, impacting both confidentiality and availability of internal communications. Organizations relying on these routers for critical connectivity or as part of their network perimeter defenses could face data breaches or network outages. The vulnerability's ease of exploitation from the network without authentication increases the attack surface, especially in environments where remote management interfaces are exposed or where users may be tricked into visiting malicious websites. This risk is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government institutions across Europe. Additionally, the lack of available patches means organizations must rely on compensating controls until a fix is released, increasing exposure time.
Mitigation Recommendations
1. Immediately disable remote management interfaces on the LevelOne WBR-6013 routers to prevent external access to the web interface. 2. Segment the network to isolate vulnerable devices from untrusted networks, limiting exposure to potential attackers. 3. Implement strict web filtering and DNS filtering to block access to known malicious sites that could host CSRF attack vectors. 4. Educate users about the risks of clicking on untrusted links or visiting suspicious websites, reducing the likelihood of triggering CSRF attacks. 5. Monitor router logs and network traffic for unusual HTTP requests or configuration changes indicative of exploitation attempts. 6. Where possible, replace affected devices with models that have updated firmware or confirmed patches addressing this vulnerability. 7. If replacement is not immediately feasible, consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) that can detect and block CSRF attack patterns targeting the router's management interface. 8. Stay informed about vendor advisories and apply firmware updates promptly once patches become available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-11-30T13:38:33.553Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a3b5cff58c9332ff08e77
Added to database: 11/4/2025, 5:43:56 PM
Last enriched: 11/4/2025, 9:55:33 PM
Last updated: 11/5/2025, 3:11:15 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-52602: CWE-359: Exposure of Private Personal Information to an Unauthorized Actor in HCL Software BigFix Query
MediumCVE-2025-3125: CWE-434 Unrestricted Upload of File with Dangerous Type in WSO2 WSO2 Identity Server
MediumCVE-2025-47151: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Entr'ouvert Lasso
CriticalCVE-2025-46784: CWE-401: Improper Release of Memory Before Removing Last Reference in Entr'ouvert Lasso
CriticalCVE-2025-46705: CWE-617: Reachable Assertion in Entr'ouvert Lasso
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.