CVE-2011-4500
Published Nov 22, 2011
Last updated 13 years ago
Overview
- Description
- The UPnP IGD implementation on the Cisco Linksys WRT54GX with firmware 2.00.05, when UPnP is enabled, configures the SOAP server to listen on the WAN port, which allows remote attackers to administer the firewall via SOAP requests.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-16
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:linksys_wrt54gx_router_firmware:2.00.05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FE3D758-A727-4DAE-B9E4-1CD2FDC36046" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:linksys:wrt54gx:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B34EC14-F0BC-446C-8F20-8F779F645EEA" } ], "operator": "OR" } ], "operator": "AND" } ]