Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-1264
The Linksys WRT54G router has "admin" as its default FTP password, which allows remote malicious users to access sensitive files including nvram.cfg, a file that lists all HTML documents, and an ELF executable file.
Linksys Wrt54g
9.8
CVSSv3
CVE-2010-1573
Linksys WAP54Gv3 firmware 3.04.03 and previous versions uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote malicious users to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameter...
Linksys Wap54g Firmware
9.8
CVSSv3
CVE-2017-17411
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper v...
Linksys Wvbr0 Firmware
2 EDB exploits
7.5
CVSSv3
CVE-2022-35572
On Linksys E5350 WiFi Router with firmware version 1.0.00.037 and lower, (and potentially other vendors/devices due to code reuse), the /SysInfo.htm URI does not require a session ID. This web page calls a show_sysinfo function which retrieves WPA passwords, SSIDs, MAC Addresses,...
Linksys E5350 Firmware
NA
CVE-2006-1973
Multiple unspecified vulnerabilities in Linksys RT31P2 VoIP router allow remote malicious users to cause a denial of service via malformed Session Initiation Protocol (SIP) messages.
Linksys Rt31p2
NA
CVE-2002-0426
VPN Server module in Linksys EtherFast BEFVP41 Cable/DSL VPN Router prior to 1.40.1 reduces the key lengths for keys that are supplied via manual key entry, which makes it easier for malicious users to crack the keys.
Linksys Befvp41
NA
CVE-2009-3341
Buffer overflow on the Linksys WRT54GL wireless router allows remote malicious users to execute arbitrary code via unspecified vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.10 up to and including 8.11. NOTE: as of 20090917, this disclosure has no a...
Linksys Wrt54gl
7.5
CVSSv3
CVE-2022-43972
A null pointer dereference vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A null pointer dereference in the soap_action function within the upnp binary can be triggered by an unauthenticated attacker via a malicious POST reque...
Linksys Wrt54gl Firmware
7.2
CVSSv3
CVE-2022-43973
An arbitrary code execution vulnerability exisits in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. The Check_TSSI function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with ad...
Linksys Wrt54gl Firmware
NA
CVE-2008-4441
The Marvell driver for the Linksys WAP4400N Wi-Fi access point with firmware 1.2.14 on the Marvell 88W8361P-BEM1 chipset, when WEP mode is enabled, does not properly parse malformed 802.11 frames, which allows remote malicious users to cause a denial of service (reboot or hang-up...
Linksys Wap400n 1.2.14
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »