7 results (0.002 seconds)

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

The Web interface in Linksys WRT54G 2.02.7 and BEFSR41 version 3, with the firewall disabled, allows remote attackers to attempt to login to an administration web page, even when the configuration specifies that remote administration is disabled. • ftp://ftp.linksys.com/pub/network/wrt54g_2.02.8_US_code_beta.zip http://archives.neohapsis.com/archives/bugtraq/2004-05/0316.html http://archives.neohapsis.com/archives/bugtraq/2004-06/0002.html http://archives.neohapsis.com/archives/bugtraq/2004-06/0020.html http://archives.neohapsis.com/archives/bugtraq/2004-06/0190.html http://secunia.com/advisories/11754 http://web.archive.org/web/20040823075750/http://www.linksys.com/download/firmware.asp?fwid=201 http://www.nwfusion. •

CVSS: 5.0EPSS: 2%CPEs: 50EXPL: 2

DHCP on Linksys BEFSR11, BEFSR41, BEFSR81, and BEFSRU31 Cable/DSL Routers, firmware version 1.45.7, does not properly clear previously used buffer contents in a BOOTP reply packet, which allows remote attackers to obtain sensitive information. DHCP en los encaminadores de cable y ADSL Linksys BEFSR11, BEFSR41, BEFSR81 y BEFSRU31, con versión de firmware 1.45.7, no limpia adecuadamente búferes usados anteriormente en un paquete de respueta BOOTP, lo que permite a atacantes remotos obtener información sensible. • https://www.exploit-db.com/exploits/24115 http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=832&p_%20%5Ccreated=1086294093&p_sid=pU1X1idh&p_lva=&p_sp=cF9zcmNoPSZwX3NvcnRfYnk9JnBfZ3JpZHNvcnQ9%20%5CJnBfcm93X2NudD02NTQmcF9wYWdlPTE%2A&p_li= http://marc.info/?l=bugtraq&m=108662876129301&w=2 http://secunia.com/advisories/11606 http://securitytracker.com/alerts/2004/May/1010288.html http://www.osvdb.org/6325 http://www.securityfocus.com/bid/10329 https://exchange& •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

Linksys EtherFast Cable/DSL BEFSR11, BEFSR41 and BEFSRU31 with the firmware 1.42.7 upgrade installed opens TCP port 5678 for remote administration even when the "Block WAN" and "Remote Admin" options are disabled, which allows remote attackers to gain access. • http://www.iss.net/security_center/static/9330.php http://www.securiteam.com/securitynews/5OP022K7GE.html http://www.securityfocus.com/bid/4987 •

CVSS: 5.0EPSS: 1%CPEs: 13EXPL: 0

Buffer overflow in the Web management interface in Linksys BEFW11S4 wireless access point router 2 and BEFSR11, BEFSR41, and BEFSRU31 EtherFast Cable/DSL routers with firmware before 1.43.3 with remote management enabled allows remote attackers to cause a denial of service (router crash) via a long password. • http://archives.neohapsis.com/archives/bugtraq/2002-12/0022.html http://www.idefense.com/application/poi/display?id=36&type=vulnerabilities&flashstatus=true http://www.securityfocus.com/bid/6208 http://www.securityfocus.com/bid/6301 http://www1.corest.com/common/showdoc.php?idx=276&idxseccion=10 https://exchange.xforce.ibmcloud.com/vulnerabilities/10654 •

CVSS: 5.0EPSS: 4%CPEs: 4EXPL: 2

The remote management web server for Linksys BEFSR41 EtherFast Cable/DSL Router before firmware 1.42.7 allows remote attackers to cause a denial of service (crash) via an HTTP request to Gozila.cgi without any arguments. El servidor de adminsitración web remota del router Linksys BEFSR41 EtherFast Cable/DSL con firmware anterior a 1.42.7 permite a atacantes remotos causar una denegación de servicio (caída) mediante una petición HTTP a Gozilla.cgi sin argumentos. • https://www.exploit-db.com/exploits/21975 http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0049.html http://marc.info/?l=bugtraq&m=103616324103171&w=2 http://www.idefense.com/advisory/10.31.02a.txt http://www.iss.net/security_center/static/10514.php http://www.securityfocus.com/bid/6086 •