Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2013-3065
Cross-site scripting (XSS) vulnerability in the Parental Controls section in Linksys EA6500 with firmware 1.1.28.147876 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to the Blocked Specific Sites section.
Linksys Ea6500 Firmware 1.1.28.147876
Linksys Ea6500 -
6.8
CVSSv2
CVE-2013-3064
Open redirect vulnerability in ui/dynamic/unsecured.html in Linksys EA6500 with firmware 1.1.28.147876 allows remote malicious users to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the target parameter.
Linksys Ea6500 Firmware 1.1.28.147876
Linksys Ea6500 -
7.1
CVSSv2
CVE-2013-3066
Linksys EA6500 with firmware 1.1.28.147876 does not properly restrict access, which allows remote malicious users to obtain sensitive information (clients and router configuration) via a request to /JNAP/.
Linksys Ea6500 Firmware 1.1.28.147876
Linksys Ea6500 -
NA
CVE-2022-43971
An arbitrary code exection vulnerability exists in Linksys WUMC710 Wireless-AC Universal Media Connector with firmware <= 1.0.02 (build3). The do_setNTP function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attac...
Linksys Wumc710 Firmware
Linksys Wumc710 Firmware 1.0.02
10
CVSSv2
CVE-2010-2261
Linksys WAP54Gv3 firmware 3.04.03 and previous versions allows remote malicious users to execute arbitrary commands via shell metacharacters in the (1) data2 and (2) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi.
Linksys Wap54gv3
Linksys Wap54gv3 3.05.03
7.5
CVSSv2
CVE-2004-2606
The Web interface in Linksys WRT54G 2.02.7 and BEFSR41 version 3, with the firewall disabled, allows remote malicious users to attempt to login to an administration web page, even when the configuration specifies that remote administration is disabled.
Linksys Befsr41 V3
Linksys Wrt54g 2.02.7
7.5
CVSSv2
CVE-2005-2799
Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions prior to 4.20.7, allows remote malicious users to execute arbitrary code via a long HTTP POST request.
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
2 EDB exploits
7.8
CVSSv2
CVE-2002-2371
Linksys WET11 firmware 1.31 and 1.32 allows remote malicious users to cause a denial of service (crash) via a packet containing the device's hardware address as the source MAC address in the DLC header.
Linksys Wet11 1.31
Linksys Wet11 1.32
9
CVSSv2
CVE-2018-3954
Devices in the Linksys ESeries line of routers (Linksys E1200 Firmware Version 2.0.09 and Linksys E2500 Firmware Version 3.0.04) are susceptible to OS command injection vulnerabilities due to improper filtering of data passed to and retrieved from NVRAMData entered into the '...
Linksys E1200 Firmware 2.0.09
Linksys E2500 Firmware 3.0.04
9
CVSSv2
CVE-2018-3955
An exploitable operating system command injection exists in the Linksys ESeries line of routers (Linksys E1200 Firmware Version 2.0.09 and Linksys E2500 Firmware Version 3.0.04). Specially crafted entries to network configuration information can cause execution of arbitrary syste...
Linksys E1200 Firmware 2.0.09
Linksys E2500 Firmware 3.0.04
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-24955
man-in-the-middle
dos
CVE-2024-2818
CVE-2024-30584
CVE-2024-31134
camera
CVE-2023-45866
CVE-2024-30585
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »