First published: Thu Jul 05 2007(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in setup.cgi on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.00.06 firmware allow remote attackers to inject arbitrary web script or HTML via the (1) c4_trap_ip_, (2) devname, (3) snmp_getcomm, or (4) snmp_setcomm parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys WAG54GS | =1.00.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3574 has a medium severity rating due to its cross-site scripting vulnerabilities allowing remote scripts injection.
To fix CVE-2007-3574, update the Cisco Linksys WAG54GS Wireless-G ADSL Gateway to a patched firmware version.
CVE-2007-3574 affects the Cisco Linksys WAG54GS Wireless-G ADSL Gateway running firmware version 1.00.06.
Yes, CVE-2007-3574 can be exploited by unauthenticated users via specially crafted URLs.
CVE-2007-3574 is vulnerable due to the parameters c4_trap_ip_, devname, snmp_getcomm, and snmp_setcomm.