Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31849: CWE-352 Cross-Site Request Forgery (CSRF) in Nexxt Solutions Nebula 300+

0
High
VulnerabilityCVE-2026-31849cvecve-2026-31849cwe-352
Published: Mon Mar 23 2026 (03/23/2026, 12:16:59 UTC)
Source: CVE Database V5
Vendor/Project: Nexxt Solutions
Product: Nebula 300+

Description

Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 does not implement CSRF protections on state-changing endpoints such as /goform/setSysTools and other administrative interfaces. As a result, an attacker can craft malicious web requests that are executed in the context of an authenticated administrator’s browser, leading to unauthorized configuration changes, including enabling services or modifying system settings.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:04:56 UTC

Technical Analysis

CVE-2026-31849 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Nexxt Solutions Nebula 300+ devices running firmware versions up to 12.01.01.37. The vulnerability stems from the absence of CSRF protections on state-changing endpoints, including /goform/setSysTools and other administrative interfaces. CSRF attacks exploit the trust a web application places in a user's browser by tricking an authenticated user into submitting unauthorized requests. In this case, an attacker can craft malicious web requests that, when executed in the context of an authenticated administrator’s browser session, result in unauthorized changes to device configurations. These changes can include enabling or disabling services, altering system settings, or other administrative modifications that compromise device security and network integrity. The vulnerability does not require the attacker to have any privileges or prior authentication, but it does require that the administrator be logged into the device and visit a malicious website or click a crafted link. The CVSS 4.0 base score is 7.2 (high), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and resulting in high impact on integrity and availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability highlights the importance of implementing CSRF tokens or other anti-CSRF mechanisms on all state-changing web endpoints, especially in administrative interfaces of network devices.

Potential Impact

The impact of CVE-2026-31849 is significant for organizations using Nexxt Solutions Nebula 300+ devices. Successful exploitation allows attackers to perform unauthorized configuration changes remotely by leveraging an authenticated administrator’s browser session. This can lead to enabling or disabling critical services, modifying network settings, or weakening security controls, potentially resulting in network downtime, exposure to further attacks, or loss of device integrity. Since these devices often serve as network infrastructure components, unauthorized changes can disrupt business operations, degrade network performance, or create persistent backdoors. The requirement for user interaction (administrator visiting a malicious site) limits mass exploitation but targeted attacks against high-value organizations remain a serious concern. The absence of known exploits in the wild suggests limited current exploitation but also indicates a window of opportunity for attackers before mitigations or patches are widely deployed.

Mitigation Recommendations

To mitigate CVE-2026-31849, organizations should immediately verify if their Nexxt Solutions Nebula 300+ devices run firmware versions at or below 12.01.01.37 and prioritize upgrading to a patched firmware version once available. In the absence of an official patch, administrators should implement compensating controls such as: 1) Restricting administrative interface access to trusted internal networks or VPNs to reduce exposure to external attackers. 2) Employing web application firewalls (WAFs) or intrusion prevention systems (IPS) to detect and block suspicious CSRF-like requests targeting administrative endpoints. 3) Educating administrators to avoid visiting untrusted websites while logged into device management consoles. 4) Enforcing multi-factor authentication (MFA) for device management interfaces to reduce risk from compromised credentials. 5) Monitoring device configuration changes and logs for unusual activity indicative of CSRF exploitation attempts. 6) If possible, implementing network segmentation to isolate management interfaces from general user traffic. These targeted mitigations help reduce the attack surface and limit the potential impact until a vendor patch is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TuranSec
Date Reserved
2026-03-09T18:20:23.399Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1d4aef4197a8e3ba0b595

Added to database: 3/24/2026, 12:02:54 AM

Last enriched: 3/31/2026, 8:04:56 PM

Last updated: 5/7/2026, 4:19:53 AM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses