// For flags

CVE-2005-2916

 

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) upload new firmware using upgrade.cgi.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-09-14 CVE Reserved
  • 2005-09-14 CVE Published
  • 2024-09-17 CVE Updated
  • 2024-09-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linksys
Search vendor "Linksys"
Wrt54g
Search vendor "Linksys" for product "Wrt54g"
3.01.3
Search vendor "Linksys" for product "Wrt54g" and version "3.01.3"
-
Affected
Linksys
Search vendor "Linksys"
Wrt54g
Search vendor "Linksys" for product "Wrt54g"
3.03.6
Search vendor "Linksys" for product "Wrt54g" and version "3.03.6"
-
Affected
Linksys
Search vendor "Linksys"
Wrt54g
Search vendor "Linksys" for product "Wrt54g"
4.00.7
Search vendor "Linksys" for product "Wrt54g" and version "4.00.7"
-
Affected