First published: Wed Sep 04 2024(Updated: )
A vulnerability was found in Linksys WRT54G 4.21.5. It has been rated as critical. Affected by this issue is the function validate_services_port of the file /apply.cgi of the component POST Parameter Handler. The manipulation of the argument services_array leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Cisco Linksys WRT54G Router Firmware | =4.21.5 | |
Cisco Linksys WRT54G Router Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8408 has been rated as critical due to its potential for stack-based buffer overflow.
To fix CVE-2024-8408, update the Linksys WRT54G firmware to a version that addresses this vulnerability.
CVE-2024-8408 affects the POST Parameter Handler in the validate_services_port function of the /apply.cgi file.
Users of Linksys WRT54G firmware version 4.21.5 are impacted by CVE-2024-8408.
CVE-2024-8408 may allow an attacker to execute arbitrary code through a stack-based buffer overflow.