The UPnP IGD implementation in the Broadcom UPnP stack on the Cisco Linksys WRT54G with firmware before 4.30.5, WRT54GS v1 through v3 with firmware before 4.71.1, and WRT54GS v4 with firmware before 1.06.1 allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an "external forwarding" vulnerability.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/357851 | US Government Resource |
http://www.upnp-hacks.org/devices.html | |
http://www.kb.cert.org/vuls/id/357851 | US Government Resource |
http://www.upnp-hacks.org/devices.html |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 01:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/357851 - US Government Resource | |
References | () http://www.upnp-hacks.org/devices.html - |
Information
Published : 2011-11-22 11:55
Updated : 2024-11-21 01:32
NVD link : CVE-2011-4499
Mitre link : CVE-2011-4499
CVE.ORG link : CVE-2011-4499
JSON object : View
Products Affected
linksys
- wrt54g
- wrt54gs
cisco
- linksys_wrt54gs_router_firmware
- linksys_wrt54g_router_firmware
CWE
CWE-16
Configuration