Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2004-2606
The Web interface in Linksys WRT54G 2.02.7 and BEFSR41 version 3, with the firewall disabled, allows remote malicious users to attempt to login to an administration web page, even when the configuration specifies that remote administration is disabled.
Linksys Befsr41 V3
Linksys Wrt54g 2.02.7
435
VMScore
CVE-2007-5411
Cross-site scripting (XSS) vulnerability in the Linksys SPA941 VoIP Phone with firmware 5.1.8 allows remote malicious users to inject arbitrary web script or HTML via the From header in a SIP message.
Linksys Spa941
1 EDB exploit
694
VMScore
CVE-2008-1265
The Linksys WRT54G router allows remote malicious users to cause a denial of service (device restart) via a long username and password to the FTP interface.
Linksys Wrt54g
383
VMScore
CVE-2009-5140
The SIP implementation on the Linksys SPA2102 phone adapter provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote malicious users to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue...
Linksys Spa2102 Firmware -
383
VMScore
CVE-2007-6707
Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and previous versions firmware allow remote malicious users to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2007-3574.
Linksys Wag54gs
668
VMScore
CVE-2007-6709
The Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and previous versions firmware has "admin" as its default password for the "admin" account, which makes it easier for remote malicious users to obtain access.
Linksys Wag54gs
445
VMScore
CVE-2006-1973
Multiple unspecified vulnerabilities in Linksys RT31P2 VoIP router allow remote malicious users to cause a denial of service via malformed Session Initiation Protocol (SIP) messages.
Linksys Rt31p2
383
VMScore
CVE-2008-1243
Cross-site scripting (XSS) vulnerability on the Linksys WRT300N router with firmware 2.00.20, when Mozilla Firefox or Apple Safari is used, allows remote malicious users to inject arbitrary web script or HTML via the dyndns_domain parameter to the default URI.
Linksys Wrt300n
356
VMScore
CVE-2008-1263
The Linksys WRT54G router stores passwords and keys in cleartext in the Config.bin file, which might allow remote authenticated users to obtain sensitive information via an HTTP request for the top-level Config.bin URI.
Linksys Wrt54g
668
VMScore
CVE-2008-1264
The Linksys WRT54G router has "admin" as its default FTP password, which allows remote malicious users to access sensitive files including nvram.cfg, a file that lists all HTML documents, and an ELF executable file.
Linksys Wrt54g
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2024-34413
CVE-2024-34089
CVE-2024-33408
local
SQL
CVE-2024-0402
CVE-2024-33910
CVE-2024-31848
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »