ID CVE-2011-4500
Summary The UPnP IGD implementation on the Cisco Linksys WRT54GX with firmware 2.00.05, when UPnP is enabled, configures the SOAP server to listen on the WAN port, which allows remote attackers to administer the firewall via SOAP requests.
References
Vulnerable Configurations
  • cpe:2.3:a:cisco:linksys_wrt54gx_router_firmware:2.00.05:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:linksys_wrt54gx_router_firmware:2.00.05:*:*:*:*:*:*:*
  • cpe:2.3:h:linksys:wrt54gx:2.0:*:*:*:*:*:*:*
    cpe:2.3:h:linksys:wrt54gx:2.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 22-11-2011 - 11:55)
Impact:
Exploitability:
CWE CWE-16
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
cert-vn VU#357851
misc http://www.upnp-hacks.org/devices.html
Last major update 22-11-2011 - 11:55
Published 22-11-2011 - 11:55
Last modified 22-11-2011 - 11:55
Back to Top