First published: Thu Sep 15 2005(Updated: )
Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions before 4.20.7, allows remote attackers to execute arbitrary code via a long HTTP POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys WRT54G | =3.01.3 | |
Linksys WRT54G | =3.03.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2799 is classified with a high severity due to its potential for remote code execution.
The recommended fix for CVE-2005-2799 is to upgrade the Linksys WRT54G firmware to version 4.20.7 or later.
CVE-2005-2799 affects Linksys WRT54G versions 3.01.3, 3.03.6, and possibly earlier versions.
CVE-2005-2799 is associated with a buffer overflow attack that can be triggered through long HTTP POST requests.
Yes, CVE-2005-2799 has known exploits that allow remote attackers to execute arbitrary code on affected devices.