First published: Fri Apr 21 2006(Updated: )
Multiple unspecified vulnerabilities in Linksys RT31P2 VoIP router allow remote attackers to cause a denial of service via malformed Session Initiation Protocol (SIP) messages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys RT31P2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1973 is classified as a high severity vulnerability due to its potential to enable denial of service attacks.
The recommended fix for CVE-2006-1973 involves updating the firmware of the Linksys RT31P2 VoIP router to the latest version provided by the manufacturer.
CVE-2006-1973 can be exploited by remote attackers sending malformed Session Initiation Protocol (SIP) messages.
CVE-2006-1973 specifically affects the Linksys RT31P2 VoIP router.
Users of the Linksys RT31P2 VoIP router are at risk of being affected by CVE-2006-1973.