Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys vulnerabilities and exploits
(subscribe to this query)
570
VMScore
CVE-2002-0109
Linksys EtherFast BEFN2PS4, BEFSR41, and BEFSR81 Routers, and possibly other products, allow remote malicious users to gain sensitive information and cause a denial of service via an SNMP query for the default community string "public," which causes the router to change...
Linksys Befsr41 0.0
Linksys Befn2ps4 0.0
Linksys Befsr81
445
VMScore
CVE-2007-1585
The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and previous versions allow remote malicious users to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE: some of these de...
Linksys Wrt54gc 1.00.7
Linksys Wrt54gc
Linksys Wag200g 1.01.01
505
VMScore
CVE-2002-1865
Buffer overflow in the Embedded HTTP server, as used in (1) D-Link DI-804 4.68, Dl-704 V2.56b6, and Dl-704 V2.56b5 and (2) Linksys Etherfast BEFW11S4 Wireless AP + Cable/DSL Router 1.37.2 up to and including 1.42.7 and Linksys WAP11 1.3 and 1.4, allows remote malicious users to c...
Linksys Befw11s4 1.37.9b
Linksys Befw11s4 1.40.3
D-link Di-804 4.68
Linksys Wap11 1.4
D-link Dl-704 2.56 B6
D-link Dl-704 2.56 B5
Linksys Befw11s4 1.37.2
Linksys Befw11s4 1.4.2.7
Linksys Befw11s4 1.42.7
Linksys Wap11 1.3
Linksys Befw11s4 1.37.2b
1 EDB exploit
445
VMScore
CVE-2005-2912
Linksys WRT54G router allows remote malicious users to cause a denial of service (CPU consumption and server hang) via an HTTP POST request with a negative Content-Length value.
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
668
VMScore
CVE-2005-2914
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote malicious users to obtain encrypted configuration information and, if the key is k...
Linksys Wrt54g 2.04.4
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
445
VMScore
CVE-2005-2916
Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions prior to 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote malicious users to (1) modify configuration using restore.cgi or (2) upload new firmwa...
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
890
VMScore
CVE-2002-2159
Linksys EtherFast Cable/DSL BEFSR11, BEFSR41 and BEFSRU31 with the firmware 1.42.7 upgrade installed opens TCP port 5678 for remote administration even when the "Block WAN" and "Remote Admin" options are disabled, which allows remote malicious users to gain ac...
Linksys Befsr41 1.42.7
Linksys Befsr11 1.42.7
Linksys Befsru31 1.42.7
258
VMScore
CVE-2010-2506
Cross-site scripting (XSS) vulnerability in debug.cgi in Linksys WAP54Gv3 firmware 3.05.03 and 3.04.03 allows remote malicious users to inject arbitrary web script or HTML via the data1 parameter.
Cisco Linksys Firmware 3.04.03
Cisco Linksys Firmware 3.05.03
Cisco Linksys Wap54g
445
VMScore
CVE-2005-2915
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, uses weak encryption (XOR encoding with a fixed byte mask) for configuration information, which could allow malicious users to decrypt the information and pos...
Linksys Wrt54g 2.04.4 Non Default
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
890
VMScore
CVE-2013-5122
Cisco Linksys Routers EA2700, EA3500, E4200, EA4500: A bug can cause an unsafe TCP port to open which leads to unauthenticated access
Cisco Linksys Ea2700 Firmware 1.0.14
Cisco Linksys Ea3500 Firmware 1.0.30
Cisco Linksys E4200 Firmware 2.0.36
Cisco Linksys Ea4500 Firmware 2.0.36
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »