3.3

CVE-2014-8243

Exploit

Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote attackers to obtain the administrator's MD5 password hash via a direct request for the /.htpasswd URI.

Data is provided by the National Vulnerability Database (NVD)
LinksysEa4500 Firmware Version <= 2.0.14212.1
LinksysEa4500 Version-
LinksysEa6500 Firmware Update153731 Version <= 1.1.40
LinksysEa6500 Version-
LinksysEa6400 Firmware Update153731 Version <= 1.1.40
LinksysEa6400 Version-
LinksysE4200v2 Firmware Version <= 2.0.14212.1
LinksysE4200v2 Version-
LinksysEa6300 Firmware Update153731 Version <= 1.1.40
LinksysEa6300 Version-
LinksysEa6900 Firmware Update158863 Version <= 1.1.42
LinksysEa6900 Version-
LinksysEa2700 Firmware Version <= 2.0.14294
LinksysEa2700 Version-
LinksysEa3500 Firmware Version <= 2.0.14294
LinksysEa3500 Version-
LinksysEa6200 Firmware Update153743 Version <= 1.1.41
LinksysEa6200 Version-
LinksysEa6700 Firmware Update153731 Version <= 1.1.40
LinksysEa6700 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.16% 0.332
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 3.3 6.5 2.9
AV:A/AC:L/Au:N/C:P/I:N/A:N