CVE-2025-58272: Cross-site request forgery (CSRF) in NTT EAST, Inc. Web Caster V130
Cross-site request forgery vulnerability exists in Web Caster V130 versions 1.08 and earlier. If a logged-in user views a malicious page created by an attacker, the settings of the product may be unintentionally changed.
AI Analysis
Technical Summary
CVE-2025-58272 is a Cross-Site Request Forgery (CSRF) vulnerability affecting NTT EAST, Inc.'s Web Caster V130 device, specifically versions 1.08 and earlier. Web Caster V130 is a network device, likely a router or gateway, used to manage network settings. The vulnerability allows an attacker to craft a malicious web page that, when visited by an authenticated user of the device, can cause unintended changes to the device's configuration without the user's consent. This occurs because the device does not sufficiently verify the origin or intent of requests that modify settings, allowing state-changing operations to be triggered via forged requests. The CVSS v3.0 base score is 3.7, indicating a low severity level. The vector string (AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L) shows that the attack requires access to the same network (Adjacent), high attack complexity, no privileges, and user interaction (the user must visit a malicious page). The impact is limited to integrity and availability with no confidentiality loss. There are no known exploits in the wild, and no patches or mitigations are currently linked. The vulnerability is published and assigned by JPCERT, indicating it is recognized and tracked by Japanese security authorities. The lack of authentication requirements means any user on the local network who can trick a logged-in user into visiting a malicious page could exploit this vulnerability. However, the high attack complexity and requirement for user interaction reduce the likelihood of widespread exploitation. The vulnerability could allow attackers to alter network configurations, potentially disrupting network availability or degrading device integrity, but it does not expose sensitive data directly.
Potential Impact
For European organizations, the impact of this vulnerability depends on the deployment of NTT EAST Web Caster V130 devices within their network infrastructure. If used, the vulnerability could allow attackers on the same local network segment to manipulate device settings by tricking authorized users into visiting malicious web pages. This could lead to network disruptions, degraded device functionality, or unauthorized changes that may weaken network security posture. Although the confidentiality impact is none, integrity and availability impacts could affect business operations relying on stable network connectivity. The requirement for user interaction and local network access limits remote exploitation risks, but insider threats or compromised internal systems could leverage this vulnerability. Organizations with remote or hybrid workforces using such devices in home or branch office environments may face increased risk due to less controlled network environments. Overall, the threat is moderate for European organizations but should not be ignored, especially in sectors where network reliability and device integrity are critical, such as telecommunications, finance, and critical infrastructure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first identify any deployments of NTT EAST Web Caster V130 devices running version 1.08 or earlier. Since no patch links are currently provided, organizations should contact NTT EAST for firmware updates or security advisories. In the interim, network segmentation should be enforced to isolate management interfaces from untrusted networks and restrict access to authorized personnel only. Implementing web filtering to block access to known malicious sites can reduce the risk of users visiting attacker-controlled pages. Educating users about the risks of clicking unknown links or visiting suspicious websites is critical. Additionally, enabling multi-factor authentication (if supported) and monitoring device logs for unauthorized configuration changes can help detect exploitation attempts. Network administrators should consider disabling remote management interfaces or restricting them to trusted IP addresses. Regularly auditing device configurations and maintaining an inventory of network devices will improve response readiness. Finally, deploying web application firewalls or intrusion detection systems that can detect CSRF attack patterns may provide additional protection.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Finland
CVE-2025-58272: Cross-site request forgery (CSRF) in NTT EAST, Inc. Web Caster V130
Description
Cross-site request forgery vulnerability exists in Web Caster V130 versions 1.08 and earlier. If a logged-in user views a malicious page created by an attacker, the settings of the product may be unintentionally changed.
AI-Powered Analysis
Technical Analysis
CVE-2025-58272 is a Cross-Site Request Forgery (CSRF) vulnerability affecting NTT EAST, Inc.'s Web Caster V130 device, specifically versions 1.08 and earlier. Web Caster V130 is a network device, likely a router or gateway, used to manage network settings. The vulnerability allows an attacker to craft a malicious web page that, when visited by an authenticated user of the device, can cause unintended changes to the device's configuration without the user's consent. This occurs because the device does not sufficiently verify the origin or intent of requests that modify settings, allowing state-changing operations to be triggered via forged requests. The CVSS v3.0 base score is 3.7, indicating a low severity level. The vector string (AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L) shows that the attack requires access to the same network (Adjacent), high attack complexity, no privileges, and user interaction (the user must visit a malicious page). The impact is limited to integrity and availability with no confidentiality loss. There are no known exploits in the wild, and no patches or mitigations are currently linked. The vulnerability is published and assigned by JPCERT, indicating it is recognized and tracked by Japanese security authorities. The lack of authentication requirements means any user on the local network who can trick a logged-in user into visiting a malicious page could exploit this vulnerability. However, the high attack complexity and requirement for user interaction reduce the likelihood of widespread exploitation. The vulnerability could allow attackers to alter network configurations, potentially disrupting network availability or degrading device integrity, but it does not expose sensitive data directly.
Potential Impact
For European organizations, the impact of this vulnerability depends on the deployment of NTT EAST Web Caster V130 devices within their network infrastructure. If used, the vulnerability could allow attackers on the same local network segment to manipulate device settings by tricking authorized users into visiting malicious web pages. This could lead to network disruptions, degraded device functionality, or unauthorized changes that may weaken network security posture. Although the confidentiality impact is none, integrity and availability impacts could affect business operations relying on stable network connectivity. The requirement for user interaction and local network access limits remote exploitation risks, but insider threats or compromised internal systems could leverage this vulnerability. Organizations with remote or hybrid workforces using such devices in home or branch office environments may face increased risk due to less controlled network environments. Overall, the threat is moderate for European organizations but should not be ignored, especially in sectors where network reliability and device integrity are critical, such as telecommunications, finance, and critical infrastructure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first identify any deployments of NTT EAST Web Caster V130 devices running version 1.08 or earlier. Since no patch links are currently provided, organizations should contact NTT EAST for firmware updates or security advisories. In the interim, network segmentation should be enforced to isolate management interfaces from untrusted networks and restrict access to authorized personnel only. Implementing web filtering to block access to known malicious sites can reduce the risk of users visiting attacker-controlled pages. Educating users about the risks of clicking unknown links or visiting suspicious websites is critical. Additionally, enabling multi-factor authentication (if supported) and monitoring device logs for unauthorized configuration changes can help detect exploitation attempts. Network administrators should consider disabling remote management interfaces or restricting them to trusted IP addresses. Regularly auditing device configurations and maintaining an inventory of network devices will improve response readiness. Finally, deploying web application firewalls or intrusion detection systems that can detect CSRF attack patterns may provide additional protection.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-08-27T23:47:30.395Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68b7d300ad5a09ad00ed52c0
Added to database: 9/3/2025, 5:32:48 AM
Last enriched: 9/10/2025, 8:35:17 PM
Last updated: 10/16/2025, 6:44:55 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-55089: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in Eclipse Foundation FileX
CriticalCVE-2025-55084: CWE-126: Buffer Over-read in Eclipse Foundation NetX Duo
MediumCVE-2025-58778: Hidden functionality in Ruijie Networks Co., Ltd. RG-EST300
HighCVE-2025-0275: CWE-306 Missing Authentication for Critical Function in HCL Software BigFix Mobile
MediumCVE-2025-0274: CWE-306 Missing Authentication for Critical Function in HCL Software BigFix Modern Client Management
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.