Vulnerabilities > CVE-2005-2916 - Unspecified vulnerability in Linksys Wrt54G 3.01.3/3.03.6/4.00.7

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
linksys
nessus

Summary

Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) upload new firmware using upgrade.cgi.

Vulnerable Configurations

Part Description Count
Hardware
Linksys
3

Nessus

NASL familyCISCO
NASL idLINKSYS_MULTIPLE_VULNS.NASL
descriptionThe remote host appears to be a Linksys WRT54G Wireless Router. The firmware version installed on the remote host is prone to several flaws: - Execute arbitrary commands on the affected router with root privilages. (CVE-2005-2916) - Download and replace the configuration of affected routers via a special POST request to the
last seen2020-06-01
modified2020-06-02
plugin id20096
published2005-10-28
reporterCopyright (C) 2005-2018 Josh Zlatin-Amishav
sourcehttps://www.tenable.com/plugins/nessus/20096
titleLinksys Multiple Vulnerabilities (OF, DoS, more)