Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2007-1585
The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and previous versions allow remote malicious users to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE: some of these de...
Linksys Wrt54gc
Linksys Wag200g 1.01.01
Linksys Wrt54gc 1.00.7
5
CVSSv2
CVE-2002-1865
Buffer overflow in the Embedded HTTP server, as used in (1) D-Link DI-804 4.68, Dl-704 V2.56b6, and Dl-704 V2.56b5 and (2) Linksys Etherfast BEFW11S4 Wireless AP + Cable/DSL Router 1.37.2 up to and including 1.42.7 and Linksys WAP11 1.3 and 1.4, allows remote malicious users to c...
D-link Di-804 4.68
D-link Dl-704 2.56 B5
Linksys Befw11s4 1.4.2.7
Linksys Befw11s4 1.40.3
Linksys Befw11s4 1.42.7
Linksys Wap11 1.3
Linksys Wap11 1.4
D-link Dl-704 2.56 B6
Linksys Befw11s4 1.37.2b
Linksys Befw11s4 1.37.2
Linksys Befw11s4 1.37.9b
1 EDB exploit
6.4
CVSSv2
CVE-2019-16340
Belkin Linksys Velop 1.1.8.192419 devices allows remote malicious users to discover the recovery key via a direct request for the /sysinfo_json.cgi URI.
Linksys Velop Whw0303 Firmware 1.1.8.192419
Linksys Velop Whw0302 Firmware 1.1.8.192419
Linksys Velop Whw0301 Firmware 1.1.8.192419
7.5
CVSSv2
CVE-2005-2914
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote malicious users to obtain encrypted configuration information and, if the key is k...
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
Linksys Wrt54g 2.04.4
5
CVSSv2
CVE-2005-2915
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, uses weak encryption (XOR encoding with a fixed byte mask) for configuration information, which could allow malicious users to decrypt the information and pos...
Linksys Wrt54g 2.04.4 Non Default
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
5
CVSSv2
CVE-2005-2916
Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions prior to 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote malicious users to (1) modify configuration using restore.cgi or (2) upload new firmwa...
Linksys Wrt54g 3.03.6
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.01.3
10
CVSSv2
CVE-2002-2159
Linksys EtherFast Cable/DSL BEFSR11, BEFSR41 and BEFSRU31 with the firmware 1.42.7 upgrade installed opens TCP port 5678 for remote administration even when the "Block WAN" and "Remote Admin" options are disabled, which allows remote malicious users to gain ac...
Linksys Befsru31 1.42.7
Linksys Befsr11 1.42.7
Linksys Befsr41 1.42.7
5
CVSSv2
CVE-2005-2912
Linksys WRT54G router allows remote malicious users to cause a denial of service (CPU consumption and server hang) via an HTTP POST request with a negative Content-Length value.
Linksys Wrt54g 3.01.3
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.03.6
7.5
CVSSv2
CVE-2011-4499
The UPnP IGD implementation in the Broadcom UPnP stack on the Cisco Linksys WRT54G with firmware prior to 4.30.5, WRT54GS v1 through v3 with firmware prior to 4.71.1, and WRT54GS v4 with firmware prior to 1.06.1 allows remote malicious users to establish arbitrary port mappings b...
Cisco Linksys Wrt54g Router Firmware 3.03.9
Cisco Linksys Wrt54g Router Firmware 4.20.7
Cisco Linksys Wrt54g Router Firmware
Linksys Wrt54g 2.2
Linksys Wrt54g
Cisco Linksys Wrt54gs Router Firmware 2.09.1
Cisco Linksys Wrt54gs Router Firmware
Linksys Wrt54gs 1.0
Linksys Wrt54gs 2.0
Linksys Wrt54gs 3.0
Linksys Wrt54gs 4.0
10
CVSSv2
CVE-2019-11535
Unsanitized user input in the web interface for Linksys WiFi extender products (RE6400 and RE6300 up to and including 1.2.04.022) allows for remote command execution. An attacker can access system OS configurations and commands that are not intended for use beyond the web UI.
Linksys Re6400 Firmware
Linksys Re6300 Firmware
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4040
privilege escalation
CVE-2024-4112
CVE-2024-32872
man-in-the-middle
CVE-2024-32788
bypass
CVE-2024-3400
CVE-2024-28976
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »