First published: Thu Jun 10 2010(Updated: )
Linksys WAP54Gv3 firmware 3.04.03 and earlier uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote attackers to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys WAP54Gv3 | =3.05.03 | |
Linksys WAP54Gv3 | <=3.04.03 | |
All of | ||
Linksys Wap54g Firmware | <=3.04.03 | |
Linksys WAP54G | =3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.