ID CVE-2007-1585
Summary The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and earlier allow remote attackers to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE: some of these details are obtained from third party information.
References
Vulnerable Configurations
  • cpe:2.3:h:linksys:wag200g:1.01.01:*:*:*:*:*:*:*
    cpe:2.3:h:linksys:wag200g:1.01.01:*:*:*:*:*:*:*
  • cpe:2.3:h:linksys:wrt54gc:1.00.7:*:*:*:*:*:*:*
    cpe:2.3:h:linksys:wrt54gc:1.00.7:*:*:*:*:*:*:*
  • cpe:2.3:h:linksys:wrt54gc:-:*:*:*:*:*:*:*
    cpe:2.3:h:linksys:wrt54gc:-:*:*:*:*:*:*:*
  • cpe:2.3:h:linksys:wrt54gc:1.03.0:*:*:*:*:*:*:*
    cpe:2.3:h:linksys:wrt54gc:1.03.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 16-10-2018 - 16:39)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 23063
bugtraq
  • 20070320 Linksys WAG200G - Information disclosure
  • 20070325 Re: Linksys WAG200G - Information disclosure
secunia 24658
xf linksys-udp-information-disclosure(33251)
Last major update 16-10-2018 - 16:39
Published 21-03-2007 - 23:19
Last modified 16-10-2018 - 16:39
Back to Top