CVE-2011-4499

The UPnP IGD implementation in the Broadcom UPnP stack on the Cisco Linksys WRT54G with firmware before 4.30.5, WRT54GS v1 through v3 with firmware before 4.71.1, and WRT54GS v4 with firmware before 1.06.1 allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an "external forwarding" vulnerability.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:cisco:linksys_wrt54g_router_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:linksys_wrt54g_router_firmware:3.03.9:*:*:*:*:*:*:*
cpe:2.3:a:cisco:linksys_wrt54g_router_firmware:4.20.7:*:*:*:*:*:*:*
OR cpe:2.3:h:linksys:wrt54g:*:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54g:2.2:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:cisco:linksys_wrt54gs_router_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:linksys_wrt54gs_router_firmware:2.09.1:*:*:*:*:*:*:*
OR cpe:2.3:h:linksys:wrt54gs:1.0:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54gs:2.0:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54gs:3.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:cisco:linksys_wrt54gs_router_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54gs:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/357851 - US Government Resource () http://www.kb.cert.org/vuls/id/357851 - US Government Resource
References () http://www.upnp-hacks.org/devices.html - () http://www.upnp-hacks.org/devices.html -

Information

Published : 2011-11-22 11:55

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4499

Mitre link : CVE-2011-4499

CVE.ORG link : CVE-2011-4499


JSON object : View

Products Affected

linksys

  • wrt54g
  • wrt54gs

cisco

  • linksys_wrt54gs_router_firmware
  • linksys_wrt54g_router_firmware
CWE
CWE-16

Configuration