ID

VAR-E-200608-0905


TITLE

Linksys WRT54GS POST Request Configuration Change Authentication Bypass Vulnerability

Trust: 0.3

sources: BID: 19347

DESCRIPTION

Linksys WRT54GS is prone to an authentication-bypass vulnerability. Reportedly, the device permits changes in its configuration settings without requring authentication.
Linksys WRT54GS is prone to an authentication-bypass vulnerability. The problem presents itself when a victim user visits a specially crafted web page on an attacker-controlled site. An attacker can exploit this vulnerability to bypass authentication and modify the configuration settings of the device.
This issue is reported to affect firmware version 1.00.9; other firmware versions may also be affected.

Trust: 0.3

sources: BID: 19347

AFFECTED PRODUCTS

vendor:linksysmodel:wrt54gscope:eqversion:v1.01.0.9

Trust: 0.3

vendor:linksysmodel:wrt54hscope:neversion:4.71.1

Trust: 0.3

vendor:linksysmodel:wrt54gscope:neversion:v51.0.10

Trust: 0.3

sources: BID: 19347

EXPLOIT

Attackers may exploit this issue using a command-line tool (such as 'curl') for transferring files with URL syntax.
A sample exploit 'curl' command line has been provided:
Bullet list:
<li><a href="/data/vulnerabilities/exploits/linksys-WRT54g-authentication-bypass.cmd">/data/vulnerabilities/exploits/linksys-WRT54g-authentication-bypass.cmd</a></li>

Trust: 0.3

sources: BID: 19347

PRICE

Free

Trust: 0.3

sources: BID: 19347

TYPE

Access Validation Error

Trust: 0.3

sources: BID: 19347

CREDITS

Ginsu Rabbit is credited with the discovery of this vulnerability.

Trust: 0.3

sources: BID: 19347

EXTERNAL IDS

db:BIDid:19347

Trust: 0.3

sources: BID: 19347

REFERENCES

url:http://www.linksys.com/

Trust: 0.3

sources: BID: 19347

SOURCES

db:BIDid:19347

LAST UPDATE DATE

2022-07-27T09:53:18.270000+00:00


SOURCES UPDATE DATE

db:BIDid:19347date:2006-11-22T16:00:00

SOURCES RELEASE DATE

db:BIDid:19347date:2006-08-04T00:00:00