Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wrt54g vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2006-2559
Linksys WRT54G Wireless-G Broadband Router allows remote malicious users to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbit...
Linksys Wrt54g 2.04.4 Non Default
Linksys Wrt54g 2.04.4
Linksys Wrt54g 2.02.7
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.01.3
Linksys Wrt54g V5
Linksys Wrt54g 3.03.6
Linksys Wrt54g 1.42.3
Linksys Wrt54g 2.00.8
5
CVSSv2
CVE-2005-2912
Linksys WRT54G router allows remote malicious users to cause a denial of service (CPU consumption and server hang) via an HTTP POST request with a negative Content-Length value.
Linksys Wrt54g 3.01.3
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.03.6
7.5
CVSSv2
CVE-2005-2914
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote malicious users to obtain encrypted configuration information and, if the key is k...
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
Linksys Wrt54g 2.04.4
5
CVSSv2
CVE-2005-2915
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, uses weak encryption (XOR encoding with a fixed byte mask) for configuration information, which could allow malicious users to decrypt the information and pos...
Linksys Wrt54g 2.04.4 Non Default
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
5
CVSSv2
CVE-2005-2916
Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions prior to 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote malicious users to (1) modify configuration using restore.cgi or (2) upload new firmwa...
Linksys Wrt54g 3.03.6
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.01.3
7.5
CVSSv2
CVE-2005-2799
Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions prior to 4.20.7, allows remote malicious users to execute arbitrary code via a long HTTP POST request.
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
2 EDB exploits
4
CVSSv2
CVE-2008-1263
The Linksys WRT54G router stores passwords and keys in cleartext in the Config.bin file, which might allow remote authenticated users to obtain sensitive information via an HTTP request for the top-level Config.bin URI.
Linksys Wrt54g
7.8
CVSSv2
CVE-2008-1265
The Linksys WRT54G router allows remote malicious users to cause a denial of service (device restart) via a long username and password to the FTP interface.
Linksys Wrt54g
10
CVSSv2
CVE-2008-1247
The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote malicious users to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) c...
Linksys Wrt54g
1 EDB exploit
7.5
CVSSv2
CVE-2008-1264
The Linksys WRT54G router has "admin" as its default FTP password, which allows remote malicious users to access sensitive files including nvram.cfg, a file that lists all HTML documents, and an ELF executable file.
Linksys Wrt54g
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
injection
CVE-2024-30983
CVE-2023-4235
CVE-2024-21338
privilege
encryption
CVE-2023-4232
CVE-2024-31497
CVE-2024-32341
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »