Описание
Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) upload new firmware using upgrade.cgi.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54g:4.00.7:*:*:*:*:*:*:*
EPSS
Процентиль: 64%
0.00476
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) upload new firmware using upgrade.cgi.
EPSS
Процентиль: 64%
0.00476
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other