Описание
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, uses weak encryption (XOR encoding with a fixed byte mask) for configuration information, which could allow attackers to decrypt the information and possibly re-encrypt it in conjunction with CVE-2005-2914.
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:linksys:wrt54g:2.04.4_non_default:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:*
EPSS
Процентиль: 40%
0.00184
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, uses weak encryption (XOR encoding with a fixed byte mask) for configuration information, which could allow attackers to decrypt the information and possibly re-encrypt it in conjunction with CVE-2005-2914.
EPSS
Процентиль: 40%
0.00184
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other