Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Gain root remotely --> Category: denial

Linksys multiple remote vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
Checks for DOS in apply.cgi

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote router is affected by multiple flaws.

Description :

The remote host appears to be a Linksys WRT54G Wireless Router.

The firmware version installed on the remote host is prone to several
flaws,

- Execute arbitrary commands on the affected router with root privilages.

- Download and replace the configuration of affected routers via a special
POST request to the 'restore.cgi' or 'upgrade.cgi' scripts.

- Allow remote attackers to obtain encrypted configuration information and,
if the key is known, modify the configuration.

- Degrade the performance of affected devices and cause the Web server
to become unresponsive, potentially denying service to legitimate users.

See also :

http://www.idefense.com/application/poi/display?id=304&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=305&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=306&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=307&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=308&type=vulnerabilities

Solution :

Upgrade to firmware version 4.20.7 or later.

Threat Level:

Critical / CVSS Base Score : 10
(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.