Page 12 of 98 results (0.010 seconds)

CVSS: 10.0EPSS: 12%CPEs: 1EXPL: 3

The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote attackers to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) ctlog.tri, (5) ddns.tri, (6) dmz.tri, (7) factdefa.tri, (8) filter.tri, (9) fw.tri, (10) manage.tri, (11) ping.tri, (12) PortRange.tri, (13) ptrigger.tri, (14) qos.tri, (15) rstatus.tri, (16) tracert.tri, (17) vpn.tri, (18) WanMac.tri, (19) WBasic.tri, or (20) WFilter.tri. NOTE: the Security.tri vector is already covered by CVE-2006-5202. El interfaz web del Router Linksys WRT54g con firmware 1.00.9 no requiere credenciales al invocar secuencias de comandos. Esto, permite a atacantes remotos realizar acciones administrativas a través de peticiones directas a (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) ctlog.tri, (5) ddns.tri, (6) dmz.tri, (7) factdefa.tri, (8) filter.tri, (9) fw.tri, (10) manage.tri, (11) ping.tri, (12) PortRange.tri, (13) ptrigger.tri, (14) qos.tri, (15) rstatus.tri, (16) tracert.tri, (17) vpn.tri, (18) WanMac.tri, (19) WBasic.tri, or (20) WFilter.tri. NOTA: El vector estSecurity.tri está tratado en CVE-2006-5202. • https://www.exploit-db.com/exploits/5313 http://kinqpinz.info/lib/wrt54g/own.txt http://secunia.com/advisories/29344 http://www.gnucitizen.org/projects/router-hacking-challenge http://www.securityfocus.com/archive/1/489009/100/0/threaded http://www.securityfocus.com/bid/28381 https://exchange.xforce.ibmcloud.com/vulnerabilities/41118 https://kinqpinz.info/lib/wrt54g https://kinqpinz.info/lib/wrt54g/own2.txt https://www.exploit-db.com/exploits/5926 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The Linksys WRT54G router has "admin" as its default FTP password, which allows remote attackers to access sensitive files including nvram.cfg, a file that lists all HTML documents, and an ELF executable file. El router Linksys WRT54G tiene "admin" como su contraseña FTP por defecto, lo cual permite a atacantes remotos acceder a ficheros sensibles incluido nvram.cfg, un fichero que lista todos los documentos HTML, y un fichero ejecutable ELF. • http://www.gnucitizen.org/projects/router-hacking-challenge http://www.securityfocus.com/archive/1/489009/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/41126 • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability on the Linksys WRT300N router with firmware 2.00.20, when Mozilla Firefox or Apple Safari is used, allows remote attackers to inject arbitrary web script or HTML via the dyndns_domain parameter to the default URI. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el router Linksys WRT300N con software empotrado (firmware) 2.00.20, cuando se utiliza Mozilla Firefox o Apple Safari, permite a atacantes remotos inyectar secuencias de comandos Web o HTML de su elección a través del parámetro dyndns_domain en el URI por defecto. • http://code.bulix.org/cx46qa-65489 http://code.bulix.org/koom78-65490 http://www.gnucitizen.org/projects/router-hacking-challenge http://www.securityfocus.com/archive/1/489009/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/41121 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site request forgery (CSRF) vulnerability in apply.cgi in the Linksys WRT54GL Wireless-G Broadband Router with firmware 4.30.9 allows remote attackers to perform actions as administrators. Vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) en apply.cgi del enrutador Linksys WRT54GL Wireless-G Broadband con firmware 4.30.9 permite a atacantes remotos llevar a cabo acciones como administrador. • http://secunia.com/advisories/28364 http://securityreason.com/securityalert/3534 http://www.securityfocus.com/archive/1/485853/100/0/threaded http://www.securityfocus.com/archive/1/486362/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/39502 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in the Linksys SPA941 VoIP Phone with firmware 5.1.8 allows remote attackers to inject arbitrary web script or HTML via the From header in a SIP message. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Linksys SPA941 VoIP Phone con el firmware 5.1.8 permite a atacantes remotos inyectar scripts web o HTML de su elección mediante la cabecera From en un mensaje SIP. • https://www.exploit-db.com/exploits/30650 http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066430.html http://secunia.com/advisories/27116 http://www.securityfocus.com/bid/25987 https://exchange.xforce.ibmcloud.com/vulnerabilities/37022 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •