Published:2008/01/28  Last Updated:2008/07/17

Multiple Yamaha routers vulnerable to cross-site request forgery


The web interface in multiple Yamaha routers is vulnerable to cross-site request forgery.

Products Affected

  • SRT100
  • RT58i
  • RT57i
  • RT56v
  • RTA55i
  • RTA54i
  • RTA52i
  • RTA50i
  • RT60w
  • RTW65i
  • RTW65b
  • RTX1100
  • RTX1500
  • RT107e
  • RTV700
  • RTX1000
  • RT80i
  • RTV01
For details, see the information provided by the vendors.


Multiple Yamaha routers provide a web-based interface for users to configure the settings of the routers.
The web interface is vulnerable to cross-site request forgery.


If the administrator views a malicious website while logged onto the web interface, the password and other configuration settings can be modified.


Update the Software
Apply the latest firmware provided by the vendors.

Change settings of the router
Change settings of the router so that no configuration settings can be modified through a web browser.

For more information, refer to the vendors' websites.

Vendor Status

Vendor Status Last Update Vendor Notes
Yamaha Corporation Vulnerable 2008/01/28
NEC Corporation Vulnerable 2008/01/31


  1. IPA
    Security Alert for Vulnerability in Multiple YAMAHA Routers

JPCERT/CC Addendum

On February 1, Yamaha reported that RTV01 was added to and RT52pro was removed from the products_affected.

Vulnerability Analysis by JPCERT/CC

Analyzed on 2008.01.28

Measures Conditions Severity
Access Required Routed - can be attacked over the Internet using packets
  • High
Authentication None - anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Medium
Exploit Complexity Low - little to no expertise and/or luck required to exploit (cross-site scripting)
  • High

Description of each analysis measures


Hirotaka Katagiri reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
JVN iPedia JVNDB-2008-000005

Update History

JVN English site opened and the first English advisory of this issue was published.
Information under the section "References" was added.