CVE-2005-2916
Published Sep 14, 2005
Last updated 16 years ago
Overview
- Description
- Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) upload new firmware using upgrade.cgi.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2930D914-EBA6-48D7-8D61-A7B0C3A140BB" }, { "criteria": "cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A9F2EDC-30F5-480E-8E6E-4D0C553AE281" }, { "criteria": "cpe:2.3:h:linksys:wrt54g:4.00.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95D095E4-B0FC-4BFF-9E72-DFDE308A9062" } ], "operator": "OR" } ] } ]