{"id":7837,"date":"2015-10-28T20:51:35","date_gmt":"2015-10-29T03:51:35","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=zerodays&p=7837"},"modified":"2023-02-06T13:40:28","modified_gmt":"2023-02-06T20:40:28","slug":"cve-2016-11015-netgear","status":"publish","type":"zerodays","link":"https:\/\/10.42.32.162\/zerodays\/cve-2016-11015-netgear\/","title":{"rendered":"CVE-2016-11015 – Cross-Site Request Forgery in Netgear Router"},"content":{"rendered":"

A Cross-site request forgery vulnerability was identified on NETGEAR JNR1010 devices before 1.0.0.32 allow cgibin\/webprocCSRFviathe: InternetGatewayDevice. X_TWSZCOM_URL_Filter.BlackList.1.URL parameter. This vulnerability is due to insufficient CSRF protections for the web UI on an affected device.<\/p>\n","protected":false},"featured_media":7841,"parent":0,"menu_order":0,"template":"","meta":{"content-type":""},"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays\/7837"}],"collection":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays"}],"about":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/types\/zerodays"}],"version-history":[{"count":5,"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays\/7837\/revisions"}],"predecessor-version":[{"id":13701,"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/zerodays\/7837\/revisions\/13701"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/media\/7841"}],"wp:attachment":[{"href":"https:\/\/10.42.32.162\/wp-json\/wp\/v2\/media?parent=7837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}