Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linksys wrt54g 3.03.6 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2005-2912
Linksys WRT54G router allows remote malicious users to cause a denial of service (CPU consumption and server hang) via an HTTP POST request with a negative Content-Length value.
Linksys Wrt54g 3.01.3
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.03.6
7.5
CVSSv2
CVE-2005-2914
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote malicious users to obtain encrypted configuration information and, if the key is k...
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
Linksys Wrt54g 2.04.4
5
CVSSv2
CVE-2005-2915
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, uses weak encryption (XOR encoding with a fixed byte mask) for configuration information, which could allow malicious users to decrypt the information and pos...
Linksys Wrt54g 2.04.4 Non Default
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
5
CVSSv2
CVE-2005-2916
Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions prior to 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote malicious users to (1) modify configuration using restore.cgi or (2) upload new firmwa...
Linksys Wrt54g 3.03.6
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.01.3
7.5
CVSSv2
CVE-2005-2799
Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions prior to 4.20.7, allows remote malicious users to execute arbitrary code via a long HTTP POST request.
Linksys Wrt54g 3.01.3
Linksys Wrt54g 3.03.6
2 EDB exploits
7.5
CVSSv2
CVE-2006-2559
Linksys WRT54G Wireless-G Broadband Router allows remote malicious users to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbit...
Linksys Wrt54g 2.04.4 Non Default
Linksys Wrt54g 2.04.4
Linksys Wrt54g 2.02.7
Linksys Wrt54g 4.00.7
Linksys Wrt54g 3.01.3
Linksys Wrt54g V5
Linksys Wrt54g 3.03.6
Linksys Wrt54g 1.42.3
Linksys Wrt54g 2.00.8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started