Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys wrt54g vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2021-27137
DD-WRT UPNP Buffer Overflow. DD-WRT is “is Linux-based firmware for wireless routers and access points. Originally designed for the Linksys WRT54G series, it now runs on a wide variety of models”. Use of user supplied data, arriving via UPNP packet, is copied into an ...
NA
CVE-2011-4499
The UPnP IGD implementation in the Broadcom UPnP stack on the Cisco Linksys WRT54G with firmware prior to 4.30.5, WRT54GS v1 through v3 with firmware prior to 4.71.1, and WRT54GS v4 with firmware prior to 1.06.1 allows remote malicious users to establish arbitrary port mappings b...
Cisco Linksys Wrt54g Router Firmware
Cisco Linksys Wrt54g Router Firmware 3.03.9
Cisco Linksys Wrt54g Router Firmware 4.20.7
Linksys Wrt54g
Linksys Wrt54g 2.2
Cisco Linksys Wrt54gs Router Firmware
Cisco Linksys Wrt54gs Router Firmware 2.09.1
Linksys Wrt54gs 1.0
Linksys Wrt54gs 2.0
Linksys Wrt54gs 3.0
Linksys Wrt54gs 4.0
NA
CVE-2008-1264
The Linksys WRT54G router has "admin" as its default FTP password, which allows remote malicious users to access sensitive files including nvram.cfg, a file that lists all HTML documents, and an ELF executable file.
Linksys Wrt54g
NA
CVE-2008-1247
The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote malicious users to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) c...
Linksys Wrt54g
1 EDB exploit
NA
CVE-2008-1263
The Linksys WRT54G router stores passwords and keys in cleartext in the Config.bin file, which might allow remote authenticated users to obtain sensitive information via an HTTP request for the top-level Config.bin URI.
Linksys Wrt54g
NA
CVE-2008-1265
The Linksys WRT54G router allows remote malicious users to cause a denial of service (device restart) via a long username and password to the FTP interface.
Linksys Wrt54g
NA
CVE-2008-1268
The FTP server on the Linksys WRT54G 7 router with 7.00.1 firmware does not verify authentication credentials, which allows remote malicious users to establish an FTP session by sending an arbitrary username and password.
Linksys Wrt54g 7
NA
CVE-2006-5202
Linksys WRT54g firmware 1.00.9 does not require credentials when making configuration changes, which allows remote malicious users to modify arbitrary configurations via a direct request to Security.tri, as demonstrated using the SecurityMode and layout parameters, a different is...
Linksys Wrt54g 1.00.9
1 EDB exploit
NA
CVE-2006-2559
Linksys WRT54G Wireless-G Broadband Router allows remote malicious users to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbit...
Linksys Wrt54g 2.04.4 Non Default
Linksys Wrt54g 2.04.4
Linksys Wrt54g 2.02.7
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.01.3
Linksys Wrt54g V5
Linksys Wrt54g 3.03.6
Linksys Wrt54g 1.42.3
Linksys Wrt54g 2.00.8
NA
CVE-2006-1067
Linksys WRT54G routers version 5 (running VXWorks) allow remote malicious users to cause a denial of service by sending a malformed DCC SEND string to an IRC channel, which causes an IRC connection reset, possibly related to the masquerading code for NAT environments, and as demo...
Linksys Wrt54g V5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »