CVE-2007-1585

The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and earlier allow remote attackers to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:linksys:wag200g:1.01.01:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54gc:*:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54gc:1.00.7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:28

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=117492736903388&w=2 - () http://marc.info/?l=bugtraq&m=117492736903388&w=2 -
References () http://secunia.com/advisories/24658 - () http://secunia.com/advisories/24658 -
References () http://www.securityfocus.com/archive/1/463342/100/0/threaded - () http://www.securityfocus.com/archive/1/463342/100/0/threaded -
References () http://www.securityfocus.com/bid/23063 - () http://www.securityfocus.com/bid/23063 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/33251 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/33251 -

Information

Published : 2007-03-21 23:19

Updated : 2024-11-21 00:28


NVD link : CVE-2007-1585

Mitre link : CVE-2007-1585

CVE.ORG link : CVE-2007-1585


JSON object : View

Products Affected

linksys

  • wrt54gc
  • wag200g