Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.20096
Categoría:Gain a shell remotely
Título:Linksys WRT54G Wireless Router < 4.20.7 Multiple Vulnerabilities - Active Check
Resumen:Linksys WRT54G Wireless Router devices are prone to multiple; vulnerabilities.
Descripción:Summary:
Linksys WRT54G Wireless Router devices are prone to multiple
vulnerabilities.

Vulnerability Insight:
The firmware version installed on the remote host is prone to
several flaws:

- Execute arbitrary commands on the affected router with root privileges.

- Download and replace the configuration of affected routers via a special POST request to the
'restore.cgi' or 'upgrade.cgi' scripts.

- Allow remote attackers to obtain encrypted configuration information and, if the key is known,
modify the configuration.

- Degrade the performance of affected devices and cause the Web server to become unresponsive,
potentially denying service to legitimate users.

Solution:
Update to firmware version 4.20.7 or later.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2005-2799
http://www.idefense.com/application/poi/display?id=305&type=vulnerabilities
Common Vulnerability Exposure (CVE) ID: CVE-2005-2912
http://www.idefense.com/application/poi/display?id=308&type=vulnerabilities
Common Vulnerability Exposure (CVE) ID: CVE-2005-2914
http://www.idefense.com/application/poi/display?id=304&type=vulnerabilities
Common Vulnerability Exposure (CVE) ID: CVE-2005-2915
Common Vulnerability Exposure (CVE) ID: CVE-2005-2916
http://www.idefense.com/application/poi/display?id=306&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=307&type=vulnerabilities
CopyrightCopyright (C) 2005 Josh Zlatin-Amishav

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.