
CVE-2024-8408 – Linksys WRT54G POST Parameter apply.cgi validate_services_port stack-based overflow
https://notcve.org/view.php?id=CVE-2024-8408
04 Sep 2024 — A vulnerability was found in Linksys WRT54G 4.21.5. It has been rated as critical. Affected by this issue is the function validate_services_port of the file /apply.cgi of the component POST Parameter Handler. The manipulation of the argument services_array leads to stack-based buffer overflow. The attack may be launched remotely. • https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_validate_services_port.md • CWE-121: Stack-based Buffer Overflow •

CVE-2024-41281
https://notcve.org/view.php?id=CVE-2024-41281
19 Jul 2024 — Linksys WRT54G v4.21.5 has a stack overflow vulnerability in get_merge_mac function. Linksys WRT54G v4.21.5 tiene una vulnerabilidad de desbordamiento de pila en la función get_merge_mac. • https://github.com/BuaaIOTTeam/Iot_Linksys/blob/main/Linksys_WRT54G_get_merge_mac.md • CWE-121: Stack-based Buffer Overflow •

CVE-2011-4499
https://notcve.org/view.php?id=CVE-2011-4499
22 Nov 2011 — The UPnP IGD implementation in the Broadcom UPnP stack on the Cisco Linksys WRT54G with firmware before 4.30.5, WRT54GS v1 through v3 with firmware before 4.71.1, and WRT54GS v4 with firmware before 1.06.1 allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an "external forwarding" vulnerability. La implementación de IGD UPnP de la pila UPnP Broadcom de Cisco Linksys WRT54G con firmware anterior a 4.30.5, de ... • http://www.kb.cert.org/vuls/id/357851 • CWE-16: Configuration •

CVE-2008-1247 – Linksys WRT54G Firmware 1.00.9 - Security Bypass
https://notcve.org/view.php?id=CVE-2008-1247
10 Mar 2008 — The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote attackers to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) ctlog.tri, (5) ddns.tri, (6) dmz.tri, (7) factdefa.tri, (8) filter.tri, (9) fw.tri, (10) manage.tri, (11) ping.tri, (12) PortRange.tri, (13) ptrigger.tri, (14) qos.tri, (15) rstatus.tri, (16) tracert.tri, (17) vpn.tri, (18) WanMac.tri, (19... • https://www.exploit-db.com/exploits/5313 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2008-1263
https://notcve.org/view.php?id=CVE-2008-1263
10 Mar 2008 — The Linksys WRT54G router stores passwords and keys in cleartext in the Config.bin file, which might allow remote authenticated users to obtain sensitive information via an HTTP request for the top-level Config.bin URI. El router Linksys WRT54G almacena contraseñas y claves en texto llano en el fichero Config.bin, lo cual permite a usuarios remotos autenticados obtener información sensible a través de una petición HTTP de la URI de nivel superior Config.bin. • http://www.gnucitizen.org/projects/router-hacking-challenge • CWE-310: Cryptographic Issues •

CVE-2008-1264
https://notcve.org/view.php?id=CVE-2008-1264
10 Mar 2008 — The Linksys WRT54G router has "admin" as its default FTP password, which allows remote attackers to access sensitive files including nvram.cfg, a file that lists all HTML documents, and an ELF executable file. El router Linksys WRT54G tiene "admin" como su contraseña FTP por defecto, lo cual permite a atacantes remotos acceder a ficheros sensibles incluido nvram.cfg, un fichero que lista todos los documentos HTML, y un fichero ejecutable ELF. • http://www.gnucitizen.org/projects/router-hacking-challenge • CWE-287: Improper Authentication •

CVE-2008-1265
https://notcve.org/view.php?id=CVE-2008-1265
10 Mar 2008 — The Linksys WRT54G router allows remote attackers to cause a denial of service (device restart) via a long username and password to the FTP interface. El router Linksys WRT54G permite a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) a través de un nombre de usuario largo y contraseña de la interfaz FTP. • http://www.gnucitizen.org/projects/router-hacking-challenge • CWE-20: Improper Input Validation •

CVE-2008-1268
https://notcve.org/view.php?id=CVE-2008-1268
10 Mar 2008 — The FTP server on the Linksys WRT54G 7 router with 7.00.1 firmware does not verify authentication credentials, which allows remote attackers to establish an FTP session by sending an arbitrary username and password. El servidor FTP en el router Linksys WRT54G 7 con software empotrado 7.00.1 no verifica credenciales de autenticación, lo cual permite a atacantes remotos establecer una sesión FTP enviando un nombre de usuario y contraseña de su elección. • http://swbae.egloos.com/1701135 • CWE-287: Improper Authentication •

CVE-2006-5202 – Linksys WRT54G Firmware 1.00.9 - Security Bypass
https://notcve.org/view.php?id=CVE-2006-5202
09 Oct 2006 — Linksys WRT54g firmware 1.00.9 does not require credentials when making configuration changes, which allows remote attackers to modify arbitrary configurations via a direct request to Security.tri, as demonstrated using the SecurityMode and layout parameters, a different issue than CVE-2006-2559. El firmware 1.00.9 del Linksys WRT54g no necesita credenciales para hacer cambios de configuración, lo que permite a atacantes remotos modificar configuraciones de su elección mediante una petición directa a Securi... • https://www.exploit-db.com/exploits/5926 •

CVE-2006-2559
https://notcve.org/view.php?id=CVE-2006-2559
24 May 2006 — Linksys WRT54G Wireless-G Broadband Router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic. • http://secunia.com/advisories/20161 •