First published: Wed May 24 2006(Updated: )
Sitecom WL-153 router firmware before 1.38 allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Sitecom WL-153 | <=1.34 | |
Sitecom WL-153 | =1.31 | |
Sitecom WL-153 router firmware | ||
Sitecom WL-153 | <=1.34 | |
Sitecom WL-153 | =1.31 | |
Sitecom WL-153 router firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2560 is considered to have a medium severity due to its potential for unauthorized access and operations on the affected router.
To fix CVE-2006-2560, upgrade the Sitecom WL-153 router firmware to version 1.38 or later.
CVE-2006-2560 enables attackers to bypass access restrictions and forward arbitrary traffic using modified UPnP requests.
CVE-2006-2560 affects Sitecom WL-153 routers running firmware versions up to 1.34 and specifically version 1.31.
Yes, CVE-2006-2560 is a vulnerability stemming from improper validation of UPnP requests in the Sitecom WL-153 router.