Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.20096
Kategorie:Gain a shell remotely
Titel:Linksys WRT54G Wireless Router < 4.20.7 Multiple Vulnerabilities - Active Check
Zusammenfassung:Linksys WRT54G Wireless Router devices are prone to multiple; vulnerabilities.
Beschreibung:Summary:
Linksys WRT54G Wireless Router devices are prone to multiple
vulnerabilities.

Vulnerability Insight:
The firmware version installed on the remote host is prone to
several flaws:

- Execute arbitrary commands on the affected router with root privileges.

- Download and replace the configuration of affected routers via a special POST request to the
'restore.cgi' or 'upgrade.cgi' scripts.

- Allow remote attackers to obtain encrypted configuration information and, if the key is known,
modify the configuration.

- Degrade the performance of affected devices and cause the Web server to become unresponsive,
potentially denying service to legitimate users.

Solution:
Update to firmware version 4.20.7 or later.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-2799
http://www.idefense.com/application/poi/display?id=305&type=vulnerabilities
Common Vulnerability Exposure (CVE) ID: CVE-2005-2912
http://www.idefense.com/application/poi/display?id=308&type=vulnerabilities
Common Vulnerability Exposure (CVE) ID: CVE-2005-2914
http://www.idefense.com/application/poi/display?id=304&type=vulnerabilities
Common Vulnerability Exposure (CVE) ID: CVE-2005-2915
Common Vulnerability Exposure (CVE) ID: CVE-2005-2916
http://www.idefense.com/application/poi/display?id=306&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=307&type=vulnerabilities
CopyrightCopyright (C) 2005 Josh Zlatin-Amishav

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.