First published: Tue Dec 31 2002(Updated: )
Linksys EtherFast Cable/DSL BEFSR11, BEFSR41 and BEFSRU31 with the firmware 1.42.7 upgrade installed opens TCP port 5678 for remote administration even when the "Block WAN" and "Remote Admin" options are disabled, which allows remote attackers to gain access.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys BEFSR11 | =1.42.7 | |
Linksys BEFSR41 | =1.42.7 | |
Linksys BEFSRU31 | =1.42.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2159 is considered to have a medium severity due to the potential for unauthorized remote access.
To fix CVE-2002-2159, upgrade the firmware of the affected Linksys models to a version that does not have this vulnerability.
The devices affected by CVE-2002-2159 include the Linksys EtherFast Cable/DSL BEFSR11, BEFSR41, and BEFSRU31 running firmware version 1.42.7.
The risk associated with CVE-2002-2159 is that remote attackers can gain access to the device due to an open TCP port 5678.
Yes, although the remote administration feature can be disabled, CVE-2002-2159 allows access despite these settings.