Page 6 of 117 results (0.004 seconds)

CVSS: 9.3EPSS: 20%CPEs: 2EXPL: 1

19 Sep 2018 — Linksys Velop 1.1.2.187020 devices allow unauthenticated command injection, providing an attacker with full root access, via cgi-bin/zbtest.cgi or cgi-bin/zbtest2.cgi (scripts that can be discovered with binwalk on the firmware, but are not visible in the web interface). This occurs because shell metacharacters in the query string are mishandled by ShellExecute, as demonstrated by the zbtest.cgi?cmd=level&level= substring. This can also be exploited via CSRF. Los dispositivos de Linksys Velop 1.1.2.187020 p... • https://langkjaer.com/velop.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 92%CPEs: 2EXPL: 4

18 Dec 2017 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. • https://packetstorm.news/files/id/145640 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

06 Aug 2017 — Cross-Site Request Forgery (CSRF) exists on Linksys EA4500 devices with Firmware Version before 2.1.41.164606, as demonstrated by a request to apply.cgi to disable SIP. Existe una vulnerabilidad de tipo Cross-Site Request Forgery (CSRF) en dispositivos Linksys EA4500 con versión de firmware anterior a 2.1.41.164606, tal y como demuestra una petición a apply.cgi para deshabilitar SIP. • https://iscouncil.blogspot.com/2017/08/cross-site-request-forgery.html • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 0%CPEs: 20EXPL: 1

01 Nov 2014 — Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote attackers to obtain the administrator's MD5 password hash via a direct request for the /.htpasswd URI. Linksys SMART WiFi firmware en los dispositivos EA2700 y EA3500; anterior a 2.1.41 build 162351 en los disposi... • http://www.kb.cert.org/vuls/id/447516 • CWE-310: Cryptographic Issues •

CVSS: 9.1EPSS: 9%CPEs: 20EXPL: 2

01 Nov 2014 — Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote attackers to obtain sensitive information or modify data via a JNAP action in a JNAP/ HTTP request. Linksys SMART WiFi firmware en los dispositivos EA2700 y EA3500; anterior a 2.1.41 build 162351 en los dispositiv... • https://github.com/JollyJumbuckk/LinksysLeaks • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 2

29 Sep 2014 — Open redirect vulnerability in ui/dynamic/unsecured.html in Linksys EA6500 with firmware 1.1.28.147876 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the target parameter. Vulnerabilidad de redirección abierta en ui/dynamic/unsecured.html en Linksys EA6500 can firmware 1.1.28.147876 permite a atacantes remotos redirigir usuarios hacia sitios web arbitrarios y realizar ataques de phishing a través de una URL en el parámetro target. • http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf •

CVSS: 5.4EPSS: 0%CPEs: 2EXPL: 2

29 Sep 2014 — Cross-site scripting (XSS) vulnerability in the Parental Controls section in Linksys EA6500 with firmware 1.1.28.147876 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to the Blocked Specific Sites section. Vulnerabilidad de XSS en la sección Parental Controls en Linksys EA6500 con firmware 1.1.28.147876 permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a través de vectores relacionados con la sección Blocked Specific ... • http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

29 Sep 2014 — Linksys EA6500 with firmware 1.1.28.147876 does not properly restrict access, which allows remote attackers to obtain sensitive information (clients and router configuration) via a request to /JNAP/. Linksys EA6500 con firmware 1.1.28.147876 no restirnge debidamente el acceso, lo que permite a atacantes remotos obtener información sensible (clientes y configuraciones de routers) a través de una solicitud en /JNAP/. • http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.1EPSS: 0%CPEs: 12EXPL: 0

22 Nov 2011 — The UPnP IGD implementation in the Broadcom UPnP stack on the Cisco Linksys WRT54G with firmware before 4.30.5, WRT54GS v1 through v3 with firmware before 4.71.1, and WRT54GS v4 with firmware before 1.06.1 allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an "external forwarding" vulnerability. La implementación de IGD UPnP de la pila UPnP Broadcom de Cisco Linksys WRT54G con firmware anterior a 4.30.5, de ... • http://www.kb.cert.org/vuls/id/357851 • CWE-16: Configuration •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

22 Nov 2011 — The UPnP IGD implementation on the Cisco Linksys WRT54GX with firmware 2.00.05, when UPnP is enabled, configures the SOAP server to listen on the WAN port, which allows remote attackers to administer the firewall via SOAP requests. La implementación de UPnP IGD en el Cisco Linksys WRT54GX con firmware v2.00.05, cuando UPnP está habilitado, configura el servidor SOAP para escuchar en el puerto WAN, lo que permite a atacantes remotos administrar el cortafuegos a través de peticiones SOAP. • http://www.kb.cert.org/vuls/id/357851 • CWE-16: Configuration •