Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.20096 |
Kategorie: | Gain a shell remotely |
Titel: | Linksys multiple remote vulnerabilities |
Zusammenfassung: | The remote host appears to be a Linksys WRT54G Wireless Router; which is affected by multiple flaws. |
Beschreibung: | Summary: The remote host appears to be a Linksys WRT54G Wireless Router which is affected by multiple flaws. Vulnerability Insight: The firmware version installed on the remote host is prone to several flaws, - Execute arbitrary commands on the affected router with root privileges. - Download and replace the configuration of affected routers via a special POST request to the 'restore.cgi' or 'upgrade.cgi' scripts. - Allow remote attackers to obtain encrypted configuration information and, if the key is known, modify the configuration. - Degrade the performance of affected devices and cause the Web server to become unresponsive, potentially denying service to legitimate users. Solution: Upgrade to firmware version 4.20.7 or later. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
BugTraq ID: 14822 Common Vulnerability Exposure (CVE) ID: CVE-2005-2799 http://www.idefense.com/application/poi/display?id=305&type=vulnerabilities Common Vulnerability Exposure (CVE) ID: CVE-2005-2914 http://www.idefense.com/application/poi/display?id=304&type=vulnerabilities Common Vulnerability Exposure (CVE) ID: CVE-2005-2915 Common Vulnerability Exposure (CVE) ID: CVE-2005-2916 http://www.idefense.com/application/poi/display?id=306&type=vulnerabilities http://www.idefense.com/application/poi/display?id=307&type=vulnerabilities |
Copyright | Copyright (C) 2005 Josh Zlatin-Amishav |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |