Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58272: Cross-site request forgery (CSRF) in NTT EAST, Inc. Web Caster V130

0
Low
VulnerabilityCVE-2025-58272cvecve-2025-58272
Published: Wed Sep 03 2025 (09/03/2025, 05:28:00 UTC)
Source: CVE Database V5
Vendor/Project: NTT EAST, Inc.
Product: Web Caster V130

Description

Cross-site request forgery vulnerability exists in Web Caster V130 versions 1.08 and earlier. If a logged-in user views a malicious page created by an attacker, the settings of the product may be unintentionally changed.

AI-Powered Analysis

AILast updated: 09/10/2025, 20:35:17 UTC

Technical Analysis

CVE-2025-58272 is a Cross-Site Request Forgery (CSRF) vulnerability affecting NTT EAST, Inc.'s Web Caster V130 device, specifically versions 1.08 and earlier. Web Caster V130 is a network device, likely a router or gateway, used to manage network settings. The vulnerability allows an attacker to craft a malicious web page that, when visited by an authenticated user of the device, can cause unintended changes to the device's configuration without the user's consent. This occurs because the device does not sufficiently verify the origin or intent of requests that modify settings, allowing state-changing operations to be triggered via forged requests. The CVSS v3.0 base score is 3.7, indicating a low severity level. The vector string (AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L) shows that the attack requires access to the same network (Adjacent), high attack complexity, no privileges, and user interaction (the user must visit a malicious page). The impact is limited to integrity and availability with no confidentiality loss. There are no known exploits in the wild, and no patches or mitigations are currently linked. The vulnerability is published and assigned by JPCERT, indicating it is recognized and tracked by Japanese security authorities. The lack of authentication requirements means any user on the local network who can trick a logged-in user into visiting a malicious page could exploit this vulnerability. However, the high attack complexity and requirement for user interaction reduce the likelihood of widespread exploitation. The vulnerability could allow attackers to alter network configurations, potentially disrupting network availability or degrading device integrity, but it does not expose sensitive data directly.

Potential Impact

For European organizations, the impact of this vulnerability depends on the deployment of NTT EAST Web Caster V130 devices within their network infrastructure. If used, the vulnerability could allow attackers on the same local network segment to manipulate device settings by tricking authorized users into visiting malicious web pages. This could lead to network disruptions, degraded device functionality, or unauthorized changes that may weaken network security posture. Although the confidentiality impact is none, integrity and availability impacts could affect business operations relying on stable network connectivity. The requirement for user interaction and local network access limits remote exploitation risks, but insider threats or compromised internal systems could leverage this vulnerability. Organizations with remote or hybrid workforces using such devices in home or branch office environments may face increased risk due to less controlled network environments. Overall, the threat is moderate for European organizations but should not be ignored, especially in sectors where network reliability and device integrity are critical, such as telecommunications, finance, and critical infrastructure.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify any deployments of NTT EAST Web Caster V130 devices running version 1.08 or earlier. Since no patch links are currently provided, organizations should contact NTT EAST for firmware updates or security advisories. In the interim, network segmentation should be enforced to isolate management interfaces from untrusted networks and restrict access to authorized personnel only. Implementing web filtering to block access to known malicious sites can reduce the risk of users visiting attacker-controlled pages. Educating users about the risks of clicking unknown links or visiting suspicious websites is critical. Additionally, enabling multi-factor authentication (if supported) and monitoring device logs for unauthorized configuration changes can help detect exploitation attempts. Network administrators should consider disabling remote management interfaces or restricting them to trusted IP addresses. Regularly auditing device configurations and maintaining an inventory of network devices will improve response readiness. Finally, deploying web application firewalls or intrusion detection systems that can detect CSRF attack patterns may provide additional protection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-08-27T23:47:30.395Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68b7d300ad5a09ad00ed52c0

Added to database: 9/3/2025, 5:32:48 AM

Last enriched: 9/10/2025, 8:35:17 PM

Last updated: 10/16/2025, 6:44:55 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats