Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys wrt54g vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-2559
Linksys WRT54G Wireless-G Broadband Router allows remote malicious users to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbit...
Linksys Wrt54g 2.04.4 Non Default
Linksys Wrt54g 2.04.4
Linksys Wrt54g 2.02.7
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.01.3
Linksys Wrt54g V5
Linksys Wrt54g 3.03.6
Linksys Wrt54g 1.42.3
Linksys Wrt54g 2.00.8
NA
CVE-2005-2912
Linksys WRT54G router allows remote malicious users to cause a denial of service (CPU consumption and server hang) via an HTTP POST request with a negative Content-Length value.
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
NA
CVE-2005-2914
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote malicious users to obtain encrypted configuration information and, if the key is k...
Linksys Wrt54g 2.04.4
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
NA
CVE-2005-2916
Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions prior to 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote malicious users to (1) modify configuration using restore.cgi or (2) upload new firmwa...
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
NA
CVE-2005-2915
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, uses weak encryption (XOR encoding with a fixed byte mask) for configuration information, which could allow malicious users to decrypt the information and pos...
Linksys Wrt54g 2.04.4 Non Default
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
NA
CVE-2011-4499
The UPnP IGD implementation in the Broadcom UPnP stack on the Cisco Linksys WRT54G with firmware prior to 4.30.5, WRT54GS v1 through v3 with firmware prior to 4.71.1, and WRT54GS v4 with firmware prior to 1.06.1 allows remote malicious users to establish arbitrary port mappings b...
Cisco Linksys Wrt54g Router Firmware
Cisco Linksys Wrt54g Router Firmware 3.03.9
Cisco Linksys Wrt54g Router Firmware 4.20.7
Linksys Wrt54g
Linksys Wrt54g 2.2
Cisco Linksys Wrt54gs Router Firmware
Cisco Linksys Wrt54gs Router Firmware 2.09.1
Linksys Wrt54gs 1.0
Linksys Wrt54gs 2.0
Linksys Wrt54gs 3.0
Linksys Wrt54gs 4.0
NA
CVE-2005-2799
Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions prior to 4.20.7, allows remote malicious users to execute arbitrary code via a long HTTP POST request.
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
2 EDB exploits
NA
CVE-2004-2606
The Web interface in Linksys WRT54G 2.02.7 and BEFSR41 version 3, with the firewall disabled, allows remote malicious users to attempt to login to an administration web page, even when the configuration specifies that remote administration is disabled.
Linksys Wrt54g 2.02.7
Linksys Befsr41 V3
NA
CVE-2008-1247
The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote malicious users to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) c...
Linksys Wrt54g
1 EDB exploit
NA
CVE-2008-1263
The Linksys WRT54G router stores passwords and keys in cleartext in the Config.bin file, which might allow remote authenticated users to obtain sensitive information via an HTTP request for the top-level Config.bin URI.
Linksys Wrt54g
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »