CVE-2026-29521: CWE-352 Cross-Site request forgery (CSRF) in Shenzhen Hereta Technology Co., Ltd. Hereta ETH-IMC408M
CVE-2026-29521 is a medium-severity cross-site request forgery (CSRF) vulnerability affecting Shenzhen Hereta Technology's ETH-IMC408M device firmware version 1. 0. 15 and earlier. The vulnerability arises from missing CSRF protections in the setup. cgi interface, allowing attackers to craft malicious web pages that submit unauthorized requests using the victim's HTTP Basic Authentication credentials. Exploitation can lead to unauthorized modification of device configurations, including adding RADIUS accounts, changing network settings, or triggering diagnostics. No authentication or privileges are required for exploitation, but user interaction is necessary to visit the malicious page. The vulnerability has a CVSS 4. 0 base score of 5. 1, reflecting moderate impact and ease of exploitation.
AI Analysis
Technical Summary
The vulnerability CVE-2026-29521 affects the Shenzhen Hereta Technology ETH-IMC408M device firmware version 1.0.15 and prior. It is a cross-site request forgery (CSRF) flaw classified under CWE-352, caused by the absence of CSRF protections in the setup.cgi web interface. This interface accepts configuration commands via HTTP requests authenticated with HTTP Basic Authentication. Because the device automatically includes these credentials when a user is logged in, an attacker can host a malicious webpage that silently submits forged requests on behalf of an authenticated user. This allows unauthorized changes to critical device settings such as adding RADIUS authentication accounts, altering network configurations, or triggering diagnostic functions. The vulnerability requires no privileges or prior authentication but does require the victim to visit a malicious webpage (user interaction). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity. No known exploits have been reported, and no official patches have been released as of the publication date. The vulnerability poses a risk of unauthorized configuration changes that could compromise network security or device availability if exploited.
Potential Impact
The primary impact of this vulnerability is unauthorized modification of device configurations, which can undermine network security and operational stability. Attackers could add rogue RADIUS accounts, potentially allowing unauthorized network access or interception of authentication traffic. Altering network settings could disrupt connectivity, redirect traffic, or expose the device to further attacks. Triggering diagnostics might be used to gather sensitive information or cause denial of service. Since the device is likely used in network infrastructure environments, such unauthorized changes could have cascading effects on enterprise or industrial network operations. The requirement for user interaction limits large-scale automated exploitation but targeted attacks against administrators or users with access to the device's web interface remain a significant risk. The absence of known exploits reduces immediate threat but does not eliminate the potential for future attacks. Organizations relying on this device should consider the risk of compromise to confidentiality, integrity, and availability of their network infrastructure.
Mitigation Recommendations
1. Immediately restrict access to the device's web management interface to trusted networks and users only, using network segmentation and firewall rules. 2. Educate users and administrators to avoid visiting untrusted or suspicious websites while logged into the device's management interface. 3. Implement web browser security measures such as disabling automatic credential submission or using browser extensions that block CSRF attacks. 4. Monitor device configurations regularly for unauthorized changes and maintain detailed logs for forensic analysis. 5. If possible, disable HTTP Basic Authentication in favor of more secure authentication methods or require multi-factor authentication. 6. Contact Shenzhen Hereta Technology for firmware updates or patches addressing this vulnerability and apply them promptly once available. 7. Consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) that can detect and block CSRF attack patterns targeting the device. 8. Employ Content Security Policy (CSP) headers and SameSite cookie attributes on management interfaces to reduce CSRF risks if the device supports such configurations.
Affected Countries
China, India, Vietnam, Thailand, Malaysia, Indonesia, Singapore, United States, Germany, United Kingdom
CVE-2026-29521: CWE-352 Cross-Site request forgery (CSRF) in Shenzhen Hereta Technology Co., Ltd. Hereta ETH-IMC408M
Description
CVE-2026-29521 is a medium-severity cross-site request forgery (CSRF) vulnerability affecting Shenzhen Hereta Technology's ETH-IMC408M device firmware version 1. 0. 15 and earlier. The vulnerability arises from missing CSRF protections in the setup. cgi interface, allowing attackers to craft malicious web pages that submit unauthorized requests using the victim's HTTP Basic Authentication credentials. Exploitation can lead to unauthorized modification of device configurations, including adding RADIUS accounts, changing network settings, or triggering diagnostics. No authentication or privileges are required for exploitation, but user interaction is necessary to visit the malicious page. The vulnerability has a CVSS 4. 0 base score of 5. 1, reflecting moderate impact and ease of exploitation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability CVE-2026-29521 affects the Shenzhen Hereta Technology ETH-IMC408M device firmware version 1.0.15 and prior. It is a cross-site request forgery (CSRF) flaw classified under CWE-352, caused by the absence of CSRF protections in the setup.cgi web interface. This interface accepts configuration commands via HTTP requests authenticated with HTTP Basic Authentication. Because the device automatically includes these credentials when a user is logged in, an attacker can host a malicious webpage that silently submits forged requests on behalf of an authenticated user. This allows unauthorized changes to critical device settings such as adding RADIUS authentication accounts, altering network configurations, or triggering diagnostic functions. The vulnerability requires no privileges or prior authentication but does require the victim to visit a malicious webpage (user interaction). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity. No known exploits have been reported, and no official patches have been released as of the publication date. The vulnerability poses a risk of unauthorized configuration changes that could compromise network security or device availability if exploited.
Potential Impact
The primary impact of this vulnerability is unauthorized modification of device configurations, which can undermine network security and operational stability. Attackers could add rogue RADIUS accounts, potentially allowing unauthorized network access or interception of authentication traffic. Altering network settings could disrupt connectivity, redirect traffic, or expose the device to further attacks. Triggering diagnostics might be used to gather sensitive information or cause denial of service. Since the device is likely used in network infrastructure environments, such unauthorized changes could have cascading effects on enterprise or industrial network operations. The requirement for user interaction limits large-scale automated exploitation but targeted attacks against administrators or users with access to the device's web interface remain a significant risk. The absence of known exploits reduces immediate threat but does not eliminate the potential for future attacks. Organizations relying on this device should consider the risk of compromise to confidentiality, integrity, and availability of their network infrastructure.
Mitigation Recommendations
1. Immediately restrict access to the device's web management interface to trusted networks and users only, using network segmentation and firewall rules. 2. Educate users and administrators to avoid visiting untrusted or suspicious websites while logged into the device's management interface. 3. Implement web browser security measures such as disabling automatic credential submission or using browser extensions that block CSRF attacks. 4. Monitor device configurations regularly for unauthorized changes and maintain detailed logs for forensic analysis. 5. If possible, disable HTTP Basic Authentication in favor of more secure authentication methods or require multi-factor authentication. 6. Contact Shenzhen Hereta Technology for firmware updates or patches addressing this vulnerability and apply them promptly once available. 7. Consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) that can detect and block CSRF attack patterns targeting the device. 8. Employ Content Security Policy (CSP) headers and SameSite cookie attributes on management interfaces to reduce CSRF risks if the device supports such configurations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-03-04T15:39:26.873Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b83bfc9d4df451837721ae
Added to database: 3/16/2026, 5:21:00 PM
Last enriched: 3/24/2026, 1:01:46 AM
Last updated: 4/29/2026, 5:51:10 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.