First published: Wed Sep 14 2005(Updated: )
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote attackers to obtain encrypted configuration information and, if the key is known, modify the configuration.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys WRT54G | =2.04.4 | |
Linksys WRT54G | =3.01.3 | |
Linksys WRT54G | =3.03.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2914 is considered a high-severity vulnerability due to its potential for remote exploitation.
To mitigate CVE-2005-2914, users should update their Linksys WRT54G router firmware to the latest version that addresses this vulnerability.
CVE-2005-2914 affects versions 2.04.4, 3.01.3, 3.03.6, and possibly other configurations of the Linksys WRT54G router.
CVE-2005-2914 allows attackers to access encrypted configuration information, potentially leading to unauthorized modifications if the encryption key is known.
Yes, CVE-2005-2914 is a network security vulnerability that can lead to unauthorized access to router configurations.