Linksys WRT54G Firmware 1.00.9 - Security Bypass Vulnerabilities (1)

admin 2023-12-12 04:54:40 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
Linksys WRT54G Firmware 1.00.9 - Security Bypass Vulnerabilities (1)

CVE编号

CVE-2008-1247

利用情况

暂无

补丁情况

N/A

披露时间

2008-03-11
漏洞描述
The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote attackers to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) ctlog.tri, (5) ddns.tri, (6) dmz.tri, (7) factdefa.tri, (8) filter.tri, (9) fw.tri, (10) manage.tri, (11) ping.tri, (12) PortRange.tri, (13) ptrigger.tri, (14) qos.tri, (15) rstatus.tri, (16) tracert.tri, (17) vpn.tri, (18) WanMac.tri, (19) WBasic.tri, or (20) WFilter.tri. NOTE: the Security.tri vector is already covered by CVE-2006-5202.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://kinqpinz.info/lib/wrt54g/own.txt
http://secunia.com/advisories/29344
http://www.gnucitizen.org/projects/router-hacking-challenge/
http://www.securityfocus.com/archive/1/489009/100/0/threaded
http://www.securityfocus.com/bid/28381
https://exchange.xforce.ibmcloud.com/vulnerabilities/41118
https://kinqpinz.info/lib/wrt54g/
https://kinqpinz.info/lib/wrt54g/own2.txt
https://www.exploit-db.com/exploits/5313
https://www.exploit-db.com/exploits/5926
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
硬件 linksys wrt54g * -
CVSS3评分 10.0
  • 攻击路径 网络
  • 攻击复杂度 低
  • 权限要求 无
  • 影响范围 N/A
  • 用户交互 无
  • 可用性 完全地
  • 保密性 完全地
  • 完整性 完全地
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-ID 漏洞类型
CWE-264 权限、特权和访问控制
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  1