Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-4500
The UPnP IGD implementation on the Cisco Linksys WRT54GX with firmware 2.00.05, when UPnP is enabled, configures the SOAP server to listen on the WAN port, which allows remote malicious users to administer the firewall via SOAP requests.
Cisco Linksys Wrt54gx Router Firmware 2.00.05
Linksys Wrt54gx 2.0
NA
CVE-2008-2092
Linksys SPA-2102 Phone Adapter 3.3.6 allows remote malicious users to cause a denial of service (crash) via a long ping packet ("ping of death"). NOTE: the severity of this issue has been disputed since there are limited attack scenarios.
Linksys Spa-2102 Phone Adapter 3.3.6
1 EDB exploit
NA
CVE-2007-5475
Multiple buffer overflows in the Marvell wireless driver, as used in Linksys WAP4400N Wi-Fi access point with firmware 1.2.17 on the Marvell 88W8361P-BEM1 chipset, and other products, allow remote 802.11-authenticated users to cause a denial of service (wireless access point cras...
Marvell 88w8361p-bem Chipset
Linksys Wap4400n 1.2.17
NA
CVE-2007-5474
The driver for the Linksys WRT350N Wi-Fi access point with firmware 2.00.17 on the Atheros AR5416-AC1E chipset does not properly parse the Atheros vendor-specific information element in an association request, which allows remote authenticated users to cause a denial of service (...
Atheros Ar5416-ac1e Chipset
Linksys Wrt350n 2.00.17
NA
CVE-2006-6411
PhoneCtrl.exe in Linksys WIP 330 Wireless-G IP Phone 1.00.06A allows remote malicious users to cause a denial of service (crash) via a TCP SYN scan, as demonstrated using TCP ports 1-65535 with nmap.
Linksys Wip 330 Wireless-g Ip Phone 1.0.6 A
NA
CVE-2001-0888
Atmel Firmware 1.3 Wireless Access Point (WAP) allows remote malicious users to cause a denial of service via a SNMP request with (1) a community string other than "public" or (2) an unknown OID, which causes the WAP to deny subsequent SNMP requests.
Atmel Firmware 1.3
Linksys Wap11 1.3
Netgear Me102 1.3
NA
CVE-2001-0514
SNMP service in Atmel 802.11b VNET-B Access Point 1.3 and previous versions, as used in Netgear ME102 and Linksys WAP11, accepts arbitrary community strings with requested MIB modifications, which allows remote malicious users to obtain sensitive information such as WEP keys, cau...
Atmel 802.11b Vnet-b Access Point
Linksys Wap11
Netgear Me102
NA
CVE-2006-5882
Stack-based buffer overflow in the Broadcom BCMWL5.SYS wireless device driver 3.50.21.10, as used in Cisco Linksys WPC300N Wireless-N Notebook Adapter prior to 4.100.15.5 and other products, allows remote malicious users to execute arbitrary code via an 802.11 response frame cont...
Linksys Wpc300n Wireless-n Notebook Adapter Driver
Broadcom Bcmwl5.sys Wireless Device Driver 3.50.21.10
1 EDB exploit
NA
CVE-2002-2137
GlobalSunTech Wireless Access Points (1) WISECOM GL2422AP-0T, and possibly OEM products such as (2) D-Link DWL-900AP+ B1 2.1 and 2.2, (3) ALLOY GL-2422AP-S, (4) EUSSO GL2422-AP, and (5) LINKSYS WAP11-V2.2, allow remote malicious users to obtain sensitive information like WEP keys...
Alloy Gl-2422ap-s
D-link Dwl-900ap\\+ B1 2.2
Linksys Wap11 2.2
D-link Dwl-900ap\\+ B1 2.1
Eusso Gl2422 Ap
Wisecom Gl2422ap-0t
8.1
CVSSv3
CVE-2013-2678
Cisco Linksys E4200 1.0.05 Build 7 routers contain a Local File Include Vulnerability which could allow remote malicious users to obtain sensitive information or execute arbitrary code by sending a crafted URL request to the apply.cgi script using the submit_type parameter.
Cisco Linksys E4200 Firmware 1.0.05
3 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
6
7
8
9
10
NEXT »