Описание
Linksys WAP54Gv3 firmware 3.04.03 and earlier uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote attackers to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi.
Ссылки
- Broken Link
- Broken LinkVendor Advisory
- Exploit
- Broken LinkThird Party AdvisoryVDB Entry
- Broken LinkThird Party AdvisoryVDB Entry
- Broken Link
- Third Party AdvisoryVDB Entry
- Broken Link
- Broken LinkVendor Advisory
- Exploit
- Broken LinkThird Party AdvisoryVDB Entry
- Broken LinkThird Party AdvisoryVDB Entry
- Broken Link
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 3.04.03 (включая)
Одновременно
cpe:2.3:o:linksys:wap54g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wap54g:3:*:*:*:*:*:*:*
EPSS
Процентиль: 93%
0.11251
Средний
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-798
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
Linksys WAP54Gv3 firmware 3.04.03 and earlier uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote attackers to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi.
EPSS
Процентиль: 93%
0.11251
Средний
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-798