10
CVSSv2

CVE-2008-1247

Published: 10/03/2008 Updated: 11/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote malicious users to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) ctlog.tri, (5) ddns.tri, (6) dmz.tri, (7) factdefa.tri, (8) filter.tri, (9) fw.tri, (10) manage.tri, (11) ping.tri, (12) PortRange.tri, (13) ptrigger.tri, (14) qos.tri, (15) rstatus.tri, (16) tracert.tri, (17) vpn.tri, (18) WanMac.tri, (19) WBasic.tri, or (20) WFilter.tri. NOTE: the Security.tri vector is already covered by CVE-2006-5202.

Vulnerable Product Search on Vulmon Subscribe to Product

linksys wrt54g

Exploits

regurgitated by: meathive url: kinqpinzinfo ;] Tue, 05 Feb 2008 07:51:41 -0700 ############################################################################ CVE-2008-1247 WRT54G firmware version: v1009 Default LAN IP: 192168 ...
The Linksys WRT54G (firmware 1009) suffers from multiple security bypass vulnerabilities ...
The Linksys WRT54G firmware version 1009 suffers from a slew of bypass vulnerabilities Full details provided ...