3 results (0.001 seconds)

CVSS: 8.8EPSS: 83%CPEs: 1EXPL: 0

01 Mar 2024 — Linksys E2000 Ver.1.0.06 build 1 is vulnerable to authentication bypass via the position.js file. • https://warp-desk-89d.notion.site/Linksys-E-2000-efcd532d8dcf4710a4af13fca131a5b8 • CWE-284: Improper Access Control •

CVSS: 8.3EPSS: 0%CPEs: 2EXPL: 1

23 May 2023 — There is a command injection vulnerability in the Linksys E2000 router with firmware version 1.0.06. If an attacker gains web management privileges, they can inject commands into the post request parameters WL_atten_bb, WL_atten_radio, and WL_atten_ctl in the apply.cgi interface, thereby gaining shell privileges. • http://linksys.com • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 8.3EPSS: 0%CPEs: 2EXPL: 1

23 May 2023 — There is a command injection vulnerability in the Linksys E2000 router with firmware version 1.0.06. If an attacker gains web management privileges, they can inject commands into the post request parameters wl_ssid, wl_ant, wl_rate, WL_atten_ctl, ttcp_num, ttcp_size in the httpd s Start_EPI() function, thereby gaining shell privileges. • http://linksys.com • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •