Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) upload new firmware using upgrade.cgi.
References
Link | Resource |
---|---|
http://www.idefense.com/application/poi/display?id=306&type=vulnerabilities | Patch Vendor Advisory |
http://www.idefense.com/application/poi/display?id=307&type=vulnerabilities | Patch Vendor Advisory |
http://www.idefense.com/application/poi/display?id=306&type=vulnerabilities | Patch Vendor Advisory |
http://www.idefense.com/application/poi/display?id=307&type=vulnerabilities | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.idefense.com/application/poi/display?id=306&type=vulnerabilities - Patch, Vendor Advisory | |
References | () http://www.idefense.com/application/poi/display?id=307&type=vulnerabilities - Patch, Vendor Advisory |
Information
Published : 2005-09-14 21:03
Updated : 2024-11-21 00:00
NVD link : CVE-2005-2916
Mitre link : CVE-2005-2916
CVE.ORG link : CVE-2005-2916
JSON object : View
Products Affected
linksys
- wrt54g
CWE