vendor:
WRT54G
by:
Raphael Rigo and Julien Tinnes
7.5
CVSS
HIGH
Stack Overflow
119
CWE
Product Name: WRT54G
Affected Version From: 1.42.2
Affected Version To: 4.20.06
Patch Exists: YES
Related CWE: CVE-2005-2799
CPE: h:linksys:wrt54g
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=20096, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/http/linksys_apply_cgi, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/http/linksys_wrt54gl_apply_exec, https://www.infosecmatter.com/nessus-plugin-library/?id=31605, https://www.infosecmatter.com/list-of-metasploit-linux-exploits-detailed-spreadsheet/
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2005
Linksys apply.cgi buffer overflow
This module exploits a stack overflow in apply.cgi on the Linksys WRT54G and WRT54GS routers. According to iDefense who discovered this vulnerability, all WRT54G versions prior to 4.20.7 and all WRT54GS version prior to 1.05.2 may be be affected.
Mitigation:
Upgrade to the latest version of the Linksys WRT54G and WRT54GS routers.