Hurry up and fix your Linksys gear already before hackers start their work. Yes 5abi that means that you let people update…![]()
http://nvd.nist.gov/nvd.cfm?cvename=CAN-2005-2916
Original release date: 9/14/2005
Last revised: 9/15/2005
Source: US-CERT/NIST
Overview
Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) upload new firmware using upgrade.cgi.
Impact
Severity: Medium
Range: Remotely exploitable
Impact Type: Allows unauthorized modification
References to Advisories, Solutions, and Tools
External Source: IDEFENSE (disclaimer)
Name: 20050913 Linksys WRT54G ‘upgrade.cgi’ Firmware Upload Design Error Vulnerability
Type: Advisory , Patch Information
Hyperlink: http://www.idefense.com/application/poi/display?id=307&type=vulnerabilities
External Source: IDEFENSE (disclaimer)
Name: 20050913 Linksys WRT54G ‘restore.cgi’ Configuration Modification Design Error Vulnerability
Type: Advisory , Patch Information
Hyperlink: http://www.idefense.com/application/poi/display?id=306&type=vulnerabilities
Vulnerable software and versions
Linksys, WRT54G, v3.01.03 (Firmware)
Linksys, WRT54G, v3.03.6 (Firmware)
Linksys, WRT54G, v4.00.7 (Firmware)
Technical Details
Vulnerability Type: Access Validation Error
CVE Standard Vulnerability Entry:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2916