3 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 1

Linksys WRT54GS and BEFW11S4 allows remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LAND). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID. Linksys WRT54GS y BEFW11S4 permiten a atacantes remotos causar una denegación de servicio (caída de dispositivo) mediante un paquete IP con los mismos IPs y puertos de origen y destino, y con la bandera SYN establecida (tcc LAND). NOTA: La proveniencia de esta cuestión es desconocida, los detalles son obtenidos exclusivamente de BID. • http://www.securityfocus.com/bid/15861 •

CVSS: 5.0EPSS: 3%CPEs: 11EXPL: 3

Buffer overflow in the Embedded HTTP server, as used in (1) D-Link DI-804 4.68, Dl-704 V2.56b6, and Dl-704 V2.56b5 and (2) Linksys Etherfast BEFW11S4 Wireless AP + Cable/DSL Router 1.37.2 through 1.42.7 and Linksys WAP11 1.3 and 1.4, allows remote attackers to cause a denial of service (crash) via a long header, as demonstrated using the Host header. • https://www.exploit-db.com/exploits/21978 http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0052.html http://www.iss.net/security_center/static/10537.php http://www.securityfocus.com/bid/6090 •

CVSS: 5.0EPSS: 1%CPEs: 13EXPL: 0

Buffer overflow in the Web management interface in Linksys BEFW11S4 wireless access point router 2 and BEFSR11, BEFSR41, and BEFSRU31 EtherFast Cable/DSL routers with firmware before 1.43.3 with remote management enabled allows remote attackers to cause a denial of service (router crash) via a long password. • http://archives.neohapsis.com/archives/bugtraq/2002-12/0022.html http://www.idefense.com/application/poi/display?id=36&type=vulnerabilities&flashstatus=true http://www.securityfocus.com/bid/6208 http://www.securityfocus.com/bid/6301 http://www1.corest.com/common/showdoc.php?idx=276&idxseccion=10 https://exchange.xforce.ibmcloud.com/vulnerabilities/10654 •