Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys vulnerabilities and exploits
(subscribe to this query)
6.3
CVSSv2
CVE-2003-1497
Buffer overflow in the system log viewer of Linksys BEFSX41 1.44.3 allows remote malicious users to cause a denial of service via an HTTP request with a long Log_Page_Num variable.
Linksys Befsx41 1.43.3
5
CVSSv2
CVE-2006-1067
Linksys WRT54G routers version 5 (running VXWorks) allow remote malicious users to cause a denial of service by sending a malformed DCC SEND string to an IRC channel, which causes an IRC connection reset, possibly related to the masquerading code for NAT environments, and as demo...
Linksys Wrt54g V5
4.3
CVSSv2
CVE-2004-2508
Cross-site scripting (XSS) vulnerability in main.cgi in Linksys WVC11B Wireless-B Internet Video Camera allows remote malicious users to inject arbitrary web script or HTML via the next_file parameter.
Linksys Wvc11b 2.10
1 EDB exploit
7.8
CVSSv2
CVE-2006-7121
The HTTP server in Linksys SPA-921 VoIP Desktop Phone allows remote malicious users to cause a denial of service (reboot) via (1) a long URL, or a long (2) username or (3) password during Basic Authentication.
Linksys Spa921 1.0.0
NA
CVE-2022-35572
On Linksys E5350 WiFi Router with firmware version 1.0.00.037 and lower, (and potentially other vendors/devices due to code reuse), the /SysInfo.htm URI does not require a session ID. This web page calls a show_sysinfo function which retrieves WPA passwords, SSIDs, MAC Addresses,...
Linksys E5350 Firmware
10
CVSSv2
CVE-2017-17411
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper v...
Linksys Wvbr0 Firmware
2 EDB exploits
10
CVSSv2
CVE-2008-4296
The Cisco Linksys WRT350N with firmware 1.0.3.7 has "admin" as its default password for the "admin" account, which makes it easier for remote malicious users to obtain access.
Cisco Linksys Wrt350n
9.3
CVSSv2
CVE-2008-0228
Cross-site request forgery (CSRF) vulnerability in apply.cgi in the Linksys WRT54GL Wireless-G Broadband Router with firmware 4.30.9 allows remote malicious users to perform actions as administrators.
Linksys Wrt54gl 4.30.9
10
CVSSv2
CVE-2010-1573
Linksys WAP54Gv3 firmware 3.04.03 and previous versions uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote malicious users to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameter...
Linksys Wap54g Firmware
6.4
CVSSv2
CVE-2004-0312
Linksys WAP55AG 1.07 allows remote attackers with access to an SNMP read only community string to gain access to read/write communtiy strings via a query for OID 1.3.6.1.4.1.3955.2.1.13.1.2.
Linksys Wap55ag 1.0.7
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »