3.3
CWE
310
Advisory Published
Updated

CVE-2014-8243

First published: Sat Nov 01 2014(Updated: )

Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote attackers to obtain the administrator's MD5 password hash via a direct request for the /.htpasswd URI.

Credit: cret@cert.org

Affected SoftwareAffected VersionHow to fix
Linksys Ea4500 Firmware<=2.0.14212.1
Linksys EA4500
Linksys Ea6500 Firmware<=1.1.40
Linksys EA6500
Linksys Ea6400 Firmware<=1.1.40
Linksys Ea6400
Linksys E4200v2 Firmware<=2.0.14212.1
Linksys E4200v2
Linksys Ea6300 Firmware<=1.1.40
Linksys Ea6300
Linksys Ea6900 Firmware<=1.1.42
Linksys Ea6900
Linksys Ea2700 Firmware<=2.0.14294
Linksys Ea2700
Linksys Ea3500 Firmware<=2.0.14294
Linksys Ea3500
Linksys Ea6200 Firmware<=1.1.41
Linksys Ea6200
Linksys Ea6700 Firmware<=1.1.40
Linksys Ea6700

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203