Логотип exploitDog
bind:CVE-2014-125122
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-125122

Количество 3

Количество 3

nvd логотип

CVE-2014-125122

18 дней назад

A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker can overwrite memory in a controlled manner, enabling them to temporarily reset the administrator password of the device to a blank value. This grants unauthorized access to the router’s web management interface without requiring valid credentials.

EPSS: Низкий
github логотип

GHSA-6r87-23pq-fxxg

18 дней назад

A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker can overwrite memory in a controlled manner, enabling them to temporarily reset the administrator password of the device to a blank value. This grants unauthorized access to the router’s web management interface without requiring valid credentials.

EPSS: Низкий
fstec логотип

BDU:2025-09434

больше 11 лет назад

Уязвимость сценария tmUnblock.cgi микропрограммного обеспечения беспроводных маршрутизаторов Linksys WRT120N, позволяющая нарушителю получить несанкционированный доступ к веб-интерфейсу управления

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2014-125122

A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker can overwrite memory in a controlled manner, enabling them to temporarily reset the administrator password of the device to a blank value. This grants unauthorized access to the router’s web management interface without requiring valid credentials.

0%
Низкий
18 дней назад
github логотип
GHSA-6r87-23pq-fxxg

A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker can overwrite memory in a controlled manner, enabling them to temporarily reset the administrator password of the device to a blank value. This grants unauthorized access to the router’s web management interface without requiring valid credentials.

0%
Низкий
18 дней назад
fstec логотип
BDU:2025-09434

Уязвимость сценария tmUnblock.cgi микропрограммного обеспечения беспроводных маршрутизаторов Linksys WRT120N, позволяющая нарушителю получить несанкционированный доступ к веб-интерфейсу управления

CVSS3: 6.3
0%
Низкий
больше 11 лет назад

Уязвимостей на страницу