First published: Thu Jun 10 2010(Updated: )
Linksys WAP54Gv3 firmware 3.04.03 and earlier uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote attackers to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi.
Credit: ykramarz@cisco.com psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Linksys WAP54G Firmware | <=3.04.03 | |
Cisco Linksys WAP54G | =3 | |
Cisco Linksys WAP54G | <=3.04.03 | |
Cisco Linksys WAP54G | =3.05.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1573 is classified as a moderate severity vulnerability due to its potential for remote command execution.
To mitigate CVE-2010-1573, update the firmware of Linksys WAP54Gv3 to version 3.05.03 or later.
CVE-2010-1573 affects Linksys WAP54Gv3 devices with firmware versions up to and including 3.04.03.
CVE-2010-1573 enables remote attackers to execute arbitrary commands on the device.
A possible workaround for CVE-2010-1573 is to disable remote management features on the device until a firmware update can be applied.