Sploit.io - Search

Product: L-04D, version: firmware version V10a and V10b

CVE-2016-4854

Severity: Unknown

Description: Cross-site request forgery (CSRF) vulnerability in L-04D firmware version V10a and V10b allows remote attackers to hijack the authentication of administrators to perform arbitrary operations via unspecified vectors.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.001400000
  • Percentile: 0.338610000
  • Date: 2026-03-30

ExploitDB

No data available.

HackerOne Data

  • Rank: 8988
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • NTT DOCOMO, INC. L-04D - Versions: firmware version V10a and V10b

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2016-4854 is a Cross-Site Request Forgery (CSRF) impacting the L-04D firmware in versions V10a and V10b. CSRF vulnerabilities allow an attacker to trick an authenticated user into performing actions on their behalf without their knowledge. The nature of this vulnerability is moderate, as it relies on the user already being authenticated to the L-04D device. However, if administrators are targeted, the business impact can be significant. The likelihood of exploitation is moderate; an attacker needs to craft a malicious request, often through a website or email, that the authenticated administrator will trigger. Ease of exploitation is also moderate, depending on the complexity of the administrative functions available on the L-04D and how easily a malicious request can be crafted. The vulnerability primarily impacts the integrity of the system, as an attacker can perform arbitrary actions as the administrator. Depending on those actions, availability and confidentiality could also be affected. The EPSS score of 0.001400000 suggests a relatively low, but non-zero, probability of exploitation.

    2. Potential Attack Scenarios
    An attacker could craft a malicious HTML page or email containing a carefully constructed request to change the administrator password on the L-04D. The attacker sends this page to an administrator already logged into the L-04D’s administrative interface. If the administrator visits the page while still authenticated, their browser will automatically send the crafted request to the L-04D, changing the administrator's password to one controlled by the attacker. This gives the attacker full administrative access to the device, allowing them to configure settings, view data, or potentially impact the device's functionality. The attack vector is a web request embedded in a web page or email. The attack process involves the administrator unknowingly submitting the malicious request while authenticated. The potential outcome is full administrative control of the L-04D device.

    3. Mitigation Recommendations
    The primary mitigation for this CSRF vulnerability is to upgrade the L-04D firmware to a version that addresses the issue. NTT DOCOMO, INC. should release a firmware update that includes CSRF protection mechanisms, such as synchronizer tokens, to validate that requests originate from legitimate user actions. In the interim, administrators should be vigilant about clicking links in emails or visiting untrusted websites while logged into the L-04D administrative interface. Implementing CSRF tokens would require the administrative interface to generate a unique, unpredictable token for each user session. Each request from the administrator should include this token, allowing the L-04D to verify that the request originated from the legitimate administrative interface and not from a malicious source. Refer to resources like OWASP’s CSRF prevention cheat sheet for best practices: https://owasp.org/www-project-top-ten/C2017/A7_Cross-Site_Request_Forgery_(CSRF).

    4. Executive Summary
    The L-04D firmware (versions V10a and V10b) is susceptible to a Cross-Site Request Forgery (CSRF) vulnerability, which could allow an attacker to hijack administrator authentication and perform arbitrary operations. While the risk is moderate, successful exploitation could result in significant disruption to the device's configuration and functionality. The vulnerability allows an attacker to make changes on behalf of an authenticated administrator, potentially impacting the integrity of the system and, depending on the actions taken, availability and confidentiality. We recommend upgrading the L-04D firmware to the latest version to incorporate robust CSRF protection. Administrators should also practice caution when clicking links or visiting websites while logged into the device's administrative interface. Prompt action is important to protect the L-04D from potential compromise and ensure continued reliable operation.