First published: Wed Sep 14 2005(Updated: )
Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) upload new firmware using upgrade.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Linksys WRT54G Router Firmware | =3.01.3 | |
Cisco Linksys WRT54G Router Firmware | =3.03.6 | |
Cisco Linksys WRT54G Router Firmware | =4.00.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2916 is considered a critical vulnerability as it allows remote attackers to modify configurations and upload malicious firmware to affected devices.
To fix CVE-2005-2916, you should upgrade to the latest firmware version 4.20.7 or later for the Linksys WRT54G router.
CVE-2005-2916 affects Linksys WRT54G versions 3.01.3, 3.03.6, 4.00.7, and possibly earlier versions prior to 4.20.7.
CVE-2005-2916 allows attackers to perform unauthorized configuration changes and potentially upload malicious firmware.
Exploitation of CVE-2005-2916 can be relatively straightforward, as it does not require prior authentication to manipulate the router’s settings.