Linksys

Wrt54g

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.48%
  • Veröffentlicht 14.09.2005 21:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or...

  • EPSS 0.18%
  • Veröffentlicht 14.09.2005 21:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, uses weak encryption (XOR encoding with a fixed byte mask) for configuration information, which could allow attackers to decrypt...

  • EPSS 0.76%
  • Veröffentlicht 14.09.2005 21:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote attackers to obtain encrypted configuration informat...

  • EPSS 0.66%
  • Veröffentlicht 14.09.2005 21:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Linksys WRT54G router allows remote attackers to cause a denial of service (CPU consumption and server hang) via an HTTP POST request with a negative Content-Length value.

  • EPSS 0.26%
  • Veröffentlicht 03.08.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Linksys WRT54G router uses the same private key and certificate for every router, which allows remote attackers to sniff the SSL connection and obtain sensitive information.

  • EPSS 2.59%
  • Veröffentlicht 31.12.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The Web interface in Linksys WRT54G 2.02.7 and BEFSR41 version 3, with the firewall disabled, allows remote attackers to attempt to login to an administration web page, even when the configuration specifies that remote administration is disabled.

Exploit
  • EPSS 7.65%
  • Veröffentlicht 06.08.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information.