
CVE-2007-2270 – Linksys SPA941 - '\377' Character Remote Denial of Service
https://notcve.org/view.php?id=CVE-2007-2270
25 Apr 2007 — The Linksys SPA941 VoIP Phone allows remote attackers to cause a denial of service (device reboot) via a 0377 (0xff) character in the From header, and possibly certain other locations, in a SIP INVITE request. Linksys SPA941 VoIP Phone permite a atacantes remotos provocar denegación de servicio (reinicio de dispositivo) a través del caracter 0377 (0ff) en la cabecera From, y posiblemente otras ciertas localizaciones en una respuesta SIP INVITE. • https://www.exploit-db.com/exploits/3791 •

CVE-2007-1585
https://notcve.org/view.php?id=CVE-2007-1585
21 Mar 2007 — The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and earlier allow remote attackers to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE: some of these details are obtained from third party information. El Linksys WAG200G con componente firmware versión 1.01.01, WRT54GC 2 con componente firmware versión 1.00.7 y WRT54GC 1 con componente firmware versión 1.03.0 y versiones anteriores permiten a los a... • http://marc.info/?l=bugtraq&m=117492736903388&w=2 •

CVE-2006-7121
https://notcve.org/view.php?id=CVE-2006-7121
06 Mar 2007 — The HTTP server in Linksys SPA-921 VoIP Desktop Phone allows remote attackers to cause a denial of service (reboot) via (1) a long URL, or a long (2) username or (3) password during Basic Authentication. El servidor HTTP en Linksys SPA-921 VoIP Desktop Phone permite a atacantes remotos provocar una denegación de servicio (reinicio) mediante (1) un URL largo, o (2) el nombre de usuario o (3) la contraseña largos durante la Autenticación Básica. • http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0089.html •

CVE-2006-6411
https://notcve.org/view.php?id=CVE-2006-6411
10 Dec 2006 — PhoneCtrl.exe in Linksys WIP 330 Wireless-G IP Phone 1.00.06A allows remote attackers to cause a denial of service (crash) via a TCP SYN scan, as demonstrated using TCP ports 1-65535 with nmap. PhoneCtrl.exe en Linksys WIP 330 Wireless-G IP Phone 1.00.06A permite a atacantes remotos provocar una denegación de servicio (caída) mediante un escaneo TCP SYN, como se demuestra usando puertos TCP 1-65535 con nmap. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051140.html •

CVE-2006-5882 – Broadcom Wireless Driver - Probe Response SSID Overflow
https://notcve.org/view.php?id=CVE-2006-5882
14 Nov 2006 — Stack-based buffer overflow in the Broadcom BCMWL5.SYS wireless device driver 3.50.21.10, as used in Cisco Linksys WPC300N Wireless-N Notebook Adapter before 4.100.15.5 and other products, allows remote attackers to execute arbitrary code via an 802.11 response frame containing a long SSID field. Desbordamiento de búfer basado en la pila en el controlador de dispositivo wireless Broadcom BCMWL5.SYS 3.50.21.10, como ha sido usado en Cisco Linksys WPC300N Wireless-N Notebook Adapter anterior a 4.100.15.5 y ot... • https://www.exploit-db.com/exploits/2770 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2006-5202 – Linksys WRT54G Firmware 1.00.9 - Security Bypass
https://notcve.org/view.php?id=CVE-2006-5202
09 Oct 2006 — Linksys WRT54g firmware 1.00.9 does not require credentials when making configuration changes, which allows remote attackers to modify arbitrary configurations via a direct request to Security.tri, as demonstrated using the SecurityMode and layout parameters, a different issue than CVE-2006-2559. El firmware 1.00.9 del Linksys WRT54g no necesita credenciales para hacer cambios de configuración, lo que permite a atacantes remotos modificar configuraciones de su elección mediante una petición directa a Securi... • https://www.exploit-db.com/exploits/5926 •

CVE-2006-2559
https://notcve.org/view.php?id=CVE-2006-2559
24 May 2006 — Linksys WRT54G Wireless-G Broadband Router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic. • http://secunia.com/advisories/20161 •

CVE-2006-1973
https://notcve.org/view.php?id=CVE-2006-1973
21 Apr 2006 — Multiple unspecified vulnerabilities in Linksys RT31P2 VoIP router allow remote attackers to cause a denial of service via malformed Session Initiation Protocol (SIP) messages. • http://secunia.com/advisories/19722 •

CVE-2006-1067
https://notcve.org/view.php?id=CVE-2006-1067
07 Mar 2006 — Linksys WRT54G routers version 5 (running VXWorks) allow remote attackers to cause a denial of service by sending a malformed DCC SEND string to an IRC channel, which causes an IRC connection reset, possibly related to the masquerading code for NAT environments, and as demonstrated via (1) a DCC SEND with a single long argument, or (2) a DCC SEND with IP, port, and filesize arguments with a 0 value. • http://www.hm2k.org/news/1141413208.html •

CVE-2006-0309
https://notcve.org/view.php?id=CVE-2006-0309
19 Jan 2006 — Linksys BEFVP41 VPN Router 2.0 with firmware 1.01.04 allows remote attackers on the local network, to cause a denial of service via IP packets with a null IP option length. • http://secunia.com/advisories/18461 •