First published: Mon Mar 10 2008(Updated: )
The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote attackers to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) ctlog.tri, (5) ddns.tri, (6) dmz.tri, (7) factdefa.tri, (8) filter.tri, (9) fw.tri, (10) manage.tri, (11) ping.tri, (12) PortRange.tri, (13) ptrigger.tri, (14) qos.tri, (15) rstatus.tri, (16) tracert.tri, (17) vpn.tri, (18) WanMac.tri, (19) WBasic.tri, or (20) WFilter.tri. NOTE: the Security.tri vector is already covered by CVE-2006-5202.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys WRT54G |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1247 is classified as a high severity vulnerability due to the potential for unauthorized administrative access.
To fix CVE-2008-1247, update the firmware of the Linksys WRT54G router to a version that enforces access controls.
CVE-2008-1247 affects users of the Linksys WRT54G router with firmware version 1.00.9.
CVE-2008-1247 can be exploited by remote attackers to perform arbitrary administrative actions without authentication.
CVE-2008-1247 remains a concern for networks still operating vulnerable versions of the Linksys WRT54G router.