Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys wag54gs vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2007-6709
The Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and previous versions firmware has "admin" as its default password for the "admin" account, which makes it easier for remote malicious users to obtain access.
Linksys Wag54gs
4.3
CVSSv2
CVE-2007-6707
Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and previous versions firmware allow remote malicious users to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2007-3574.
Linksys Wag54gs
4.3
CVSSv2
CVE-2007-6708
Multiple cross-site request forgery (CSRF) vulnerabilities on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and previous versions firmware allow remote malicious users to perform actions as administrators via an arbitrary valid request to an administrative URI, a...
Linksys Wag54gs
4.3
CVSSv2
CVE-2007-3574
Multiple cross-site scripting (XSS) vulnerabilities in setup.cgi on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.00.06 firmware allow remote malicious users to inject arbitrary web script or HTML via the (1) c4_trap_ip_, (2) devname, (3) snmp_getcomm, or (4) snmp_setc...
Linksys Wag54gs 1.00.06
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started