Описание
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote attackers to obtain encrypted configuration information and, if the key is known, modify the configuration.
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:linksys:wrt54g:2.04.4:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:*
EPSS
Процентиль: 73%
0.00757
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote attackers to obtain encrypted configuration information and, if the key is known, modify the configuration.
EPSS
Процентиль: 73%
0.00757
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other