Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2008-1247
The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote malicious users to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) c...
Linksys Wrt54g
1 EDB exploit
890
VMScore
CVE-2010-1573
Linksys WAP54Gv3 firmware 3.04.03 and previous versions uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote malicious users to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameter...
Linksys Wap54g Firmware
890
VMScore
CVE-2009-3341
Buffer overflow on the Linksys WRT54GL wireless router allows remote malicious users to execute arbitrary code via unspecified vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.10 up to and including 8.11. NOTE: as of 20090917, this disclosure has no a...
Linksys Wrt54gl
605
VMScore
CVE-2017-10677
Cross-Site Request Forgery (CSRF) exists on Linksys EA4500 devices with Firmware Version prior to 2.1.41.164606, as demonstrated by a request to apply.cgi to disable SIP.
Linksys Ea4500 Firmware
1000
VMScore
CVE-2017-17411
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper v...
Linksys Wvbr0 Firmware
2 EDB exploits
890
VMScore
CVE-2020-35713
Belkin LINKSYS RE6500 devices prior to 1.0.012.001 allow remote malicious users to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
Linksys Re6500 Firmware
1 Github repository
578
VMScore
CVE-2020-35714
Belkin LINKSYS RE6500 devices prior to 1.0.11.001 allow remote authenticated users to execute arbitrary commands via goform/systemCommand?command= in conjunction with the goform/pingstart program.
Linksys Re6500 Firmware
801
VMScore
CVE-2020-35715
Belkin LINKSYS RE6500 devices prior to 1.0.012.001 allow remote authenticated users to execute arbitrary commands via shell metacharacters in a filename to the upload_settings.cgi page.
Linksys Re6500 Firmware
694
VMScore
CVE-2020-35716
Belkin LINKSYS RE6500 devices prior to 1.0.012.001 allow remote malicious users to cause a persistent denial of service (segmentation fault) via a long /goform/langSwitch langSelectionOnly parameter.
Linksys Re6500 Firmware
NA
CVE-2023-31740
There is a command injection vulnerability in the Linksys E2000 router with firmware version 1.0.06. If an attacker gains web management privileges, they can inject commands into the post request parameters WL_atten_bb, WL_atten_radio, and WL_atten_ctl in the apply.cgi interface,...
Linksys E2000 Firmware 1.0.06
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »