Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-43970
A buffer overflow vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A stack-based buffer overflow in the Start_EPI function within the httpd binary allows an authenticated attacker with administrator privileges to execute arbitra...
Linksys Wrt54gl Firmware
NA
CVE-2022-43972
A null pointer dereference vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A null pointer dereference in the soap_action function within the upnp binary can be triggered by an unauthenticated attacker via a malicious POST reque...
Linksys Wrt54gl Firmware
NA
CVE-2022-43973
An arbitrary code execution vulnerability exisits in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. The Check_TSSI function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with ad...
Linksys Wrt54gl Firmware
4.9
CVSSv2
CVE-2022-24372
Linksys MR9600 devices prior to 2.0.5 allow malicious users to read arbitrary files via a symbolic link to the root directory of a NAS SMB share.
Linksys Mr9600 Firmware
5
CVSSv2
CVE-2005-2434
Linksys WRT54G router uses the same private key and certificate for every router, which allows remote malicious users to sniff the SSL connection and obtain sensitive information.
Linksys Wrt54g
6.5
CVSSv2
CVE-2020-35714
Belkin LINKSYS RE6500 devices prior to 1.0.11.001 allow remote authenticated users to execute arbitrary commands via goform/systemCommand?command= in conjunction with the goform/pingstart program.
Linksys Re6500 Firmware
9
CVSSv2
CVE-2020-35715
Belkin LINKSYS RE6500 devices prior to 1.0.012.001 allow remote authenticated users to execute arbitrary commands via shell metacharacters in a filename to the upload_settings.cgi page.
Linksys Re6500 Firmware
7.8
CVSSv2
CVE-2020-35716
Belkin LINKSYS RE6500 devices prior to 1.0.012.001 allow remote malicious users to cause a persistent denial of service (segmentation fault) via a long /goform/langSwitch langSelectionOnly parameter.
Linksys Re6500 Firmware
10
CVSSv2
CVE-2010-1573
Linksys WAP54Gv3 firmware 3.04.03 and previous versions uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote malicious users to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameter...
Linksys Wap54g Firmware
4.3
CVSSv2
CVE-2008-1243
Cross-site scripting (XSS) vulnerability on the Linksys WRT300N router with firmware 2.00.20, when Mozilla Firefox or Apple Safari is used, allows remote malicious users to inject arbitrary web script or HTML via the dyndns_domain parameter to the default URI.
Linksys Wrt300n
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30924
CVE-2024-3400
overflow
CVE-2024-23528
CVE-2024-21338
CVE-2024-3818
CVE-2024-23535
NULL pointer dereference
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »