First published: Tue Nov 22 2011(Updated: )
The UPnP IGD implementation on the Cisco Linksys WRT54GX with firmware 2.00.05, when UPnP is enabled, configures the SOAP server to listen on the WAN port, which allows remote attackers to administer the firewall via SOAP requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Linksys Wrt54gx Router Firmware | =2.00.05 | |
Linksys WRT54GX | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4500 has a high severity rating due to its remote exploitation potential.
To fix CVE-2011-4500, disable UPnP on the Cisco Linksys WRT54GX router or upgrade to a patched firmware version.
CVE-2011-4500 affects the Cisco Linksys WRT54GX router running firmware version 2.00.05.
Yes, CVE-2011-4500 can be exploited remotely if UPnP is enabled on the affected router.
CVE-2011-4500 can allow attackers to administer the firewall through unauthorized SOAP requests.