First published: Mon Jan 24 2011(Updated: )
Buffer overflow in the web-based management interface on the Cisco Linksys WRT54GC router with firmware before 1.06.1 allows remote attackers to cause a denial of service (device crash) via a long string in a POST request.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Linksys WRT54GC Router Firmware | ||
Cisco Linksys WRT54GC Router Firmware | <=1.05.7 | |
Cisco Linksys WRT54GC Router Firmware | =1.02.5 | |
Cisco Linksys WRT54GC Router Firmware | =1.02.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0352 has a severity rating that indicates a potential denial of service vulnerability due to a buffer overflow.
To fix CVE-2011-0352, you should update the firmware of the Cisco Linksys WRT54GC router to version 1.06.1 or later.
CVE-2011-0352 affects the Cisco Linksys WRT54GC router with specific firmware versions prior to 1.06.1.
Attackers can exploit CVE-2011-0352 to send a long string in a POST request, resulting in a device crash or denial of service.
Yes, CVE-2011-0352 can be exploited remotely due to the nature of the web-based management interface.