First published: Thu Mar 13 2008(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and earlier firmware allow remote attackers to perform actions as administrators via an arbitrary valid request to an administrative URI, as demonstrated by (1) a Restore Factory Defaults action using the mtenRestore parameter to setup.cgi and (2) creation of a user account using the sysname parameter to setup.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys WAG54GS | <=firmware_1.01.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6708 has a high severity due to its potential for remote exploitation via cross-site request forgery.
To fix CVE-2007-6708, update the Cisco Linksys WAG54GS Wireless-G ADSL Gateway to firmware version greater than 1.01.03.
CVE-2007-6708 allows attackers to perform unauthorized actions as administrators on the affected device.
CVE-2007-6708 affects Cisco Linksys WAG54GS Wireless-G ADSL Gateway models running firmware 1.01.03 or earlier.
Yes, CVE-2007-6708 can be exploited remotely by sending arbitrary valid requests to administrative URIs.