3.3
CVE-2014-8243
- EPSS 0.16%
- Published 01.11.2014 10:55:02
- Last modified 12.04.2025 10:46:40
- Source cret@cert.org
- Teams watchlist Login
- Open Login
Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote attackers to obtain the administrator's MD5 password hash via a direct request for the /.htpasswd URI.
Data is provided by the National Vulnerability Database (NVD)
Linksys ≫ Ea4500 Firmware Version <= 2.0.14212.1
Linksys ≫ Ea6500 Firmware Update153731 Version <= 1.1.40
Linksys ≫ Ea6400 Firmware Update153731 Version <= 1.1.40
Linksys ≫ E4200v2 Firmware Version <= 2.0.14212.1
Linksys ≫ Ea6300 Firmware Update153731 Version <= 1.1.40
Linksys ≫ Ea6900 Firmware Update158863 Version <= 1.1.42
Linksys ≫ Ea2700 Firmware Version <= 2.0.14294
Linksys ≫ Ea3500 Firmware Version <= 2.0.14294
Linksys ≫ Ea6200 Firmware Update153743 Version <= 1.1.41
Linksys ≫ Ea6700 Firmware Update153731 Version <= 1.1.40
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.16% | 0.332 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 3.3 | 6.5 | 2.9 |
AV:A/AC:L/Au:N/C:P/I:N/A:N
|