First published: Wed Mar 21 2007(Updated: )
The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and earlier allow remote attackers to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys WAG200G | =1.01.01 | |
Cisco Linksys WRT54GC Router Firmware | <=1.03.0 | |
Cisco Linksys WRT54GC Router Firmware | =1.00.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1585 has been classified as a medium severity vulnerability.
To fix CVE-2007-1585, update the firmware of the affected Linksys devices to the latest version available.
CVE-2007-1585 affects the Linksys WAG200G and WRT54GC models with specific firmware versions.
CVE-2007-1585 can expose sensitive information such as passwords and configuration data.
Yes, CVE-2007-1585 can be exploited remotely through a packet sent to UDP port 916.