ID

VAR-200803-0007


CVE

CVE-2007-6708


TITLE

Cisco Linksys WAG54GS Wireless-G ADSL Gateway Vulnerable to cross-site request forgery

Trust: 0.8

sources: JVNDB: JVNDB-2008-003896

DESCRIPTION

Multiple cross-site request forgery (CSRF) vulnerabilities on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and earlier firmware allow remote attackers to perform actions as administrators via an arbitrary valid request to an administrative URI, as demonstrated by (1) a Restore Factory Defaults action using the mtenRestore parameter to setup.cgi and (2) creation of a user account using the sysname parameter to setup.cgi

Trust: 2.07

sources: NVD: CVE-2007-6708 // JVNDB: JVNDB-2008-003896 // BID: 85175 // VULHUB: VHN-30070 // VULMON: CVE-2007-6708

AFFECTED PRODUCTS

vendor:linksysmodel:wag54gsscope:lteversion:firmware_1.01.03

Trust: 1.0

vendor:cisco linksysmodel:wag54gsscope:lteversion:1.01.03

Trust: 0.8

vendor:linksysmodel:wag54gsscope:eqversion:firmware_1.01.03

Trust: 0.6

vendor:linksysmodel:wireless-g adsl gateway wag54gsscope:eqversion:1.01.03

Trust: 0.3

sources: BID: 85175 // JVNDB: JVNDB-2008-003896 // CNNVD: CNNVD-200803-208 // NVD: CVE-2007-6708

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-6708
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-6708
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200803-208
value: MEDIUM

Trust: 0.6

VULHUB: VHN-30070
value: MEDIUM

Trust: 0.1

VULMON: CVE-2007-6708
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-6708
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-30070
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-30070 // VULMON: CVE-2007-6708 // JVNDB: JVNDB-2008-003896 // CNNVD: CNNVD-200803-208 // NVD: CVE-2007-6708

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-30070 // JVNDB: JVNDB-2008-003896 // NVD: CVE-2007-6708

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200803-208

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-200803-208

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-003896

PATCH

title:Linksysurl:http://home.cisco.com/en-apac/home

Trust: 0.8

sources: JVNDB: JVNDB-2008-003896

EXTERNAL IDS

db:NVDid:CVE-2007-6708

Trust: 2.9

db:OSVDBid:43537

Trust: 1.8

db:OSVDBid:43538

Trust: 1.8

db:XFid:41269

Trust: 0.9

db:JVNDBid:JVNDB-2008-003896

Trust: 0.8

db:CNNVDid:CNNVD-200803-208

Trust: 0.7

db:BUGTRAQid:20080301 THE ROUTER HACKING CHALLENGE IS OVER!

Trust: 0.6

db:XFid:54

Trust: 0.6

db:BIDid:85175

Trust: 0.5

db:VULHUBid:VHN-30070

Trust: 0.1

db:VULMONid:CVE-2007-6708

Trust: 0.1

sources: VULHUB: VHN-30070 // VULMON: CVE-2007-6708 // BID: 85175 // JVNDB: JVNDB-2008-003896 // CNNVD: CNNVD-200803-208 // NVD: CVE-2007-6708

REFERENCES

url:http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/

Trust: 2.1

url:http://www.gnucitizen.org/projects/router-hacking-challenge/

Trust: 2.1

url:http://osvdb.org/43537

Trust: 1.8

url:http://osvdb.org/43538

Trust: 1.8

url:http://www.securityfocus.com/archive/1/489009/100/0/threaded

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41269

Trust: 1.2

url:http://xforce.iss.net/xforce/xfdb/41269

Trust: 0.9

url:http://www.securityfocus.com/archive/1/archive/1/489009/100/0/threaded

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6708

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-6708

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/352.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/85175

Trust: 0.1

sources: VULHUB: VHN-30070 // VULMON: CVE-2007-6708 // BID: 85175 // JVNDB: JVNDB-2008-003896 // CNNVD: CNNVD-200803-208 // NVD: CVE-2007-6708

CREDITS

Unknown

Trust: 0.3

sources: BID: 85175

SOURCES

db:VULHUBid:VHN-30070
db:VULMONid:CVE-2007-6708
db:BIDid:85175
db:JVNDBid:JVNDB-2008-003896
db:CNNVDid:CNNVD-200803-208
db:NVDid:CVE-2007-6708

LAST UPDATE DATE

2025-04-10T22:32:37.941000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-30070date:2018-10-15T00:00:00
db:VULMONid:CVE-2007-6708date:2018-10-15T00:00:00
db:BIDid:85175date:2008-03-13T00:00:00
db:JVNDBid:JVNDB-2008-003896date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200803-208date:2008-03-14T00:00:00
db:NVDid:CVE-2007-6708date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-30070date:2008-03-13T00:00:00
db:VULMONid:CVE-2007-6708date:2008-03-13T00:00:00
db:BIDid:85175date:2008-03-13T00:00:00
db:JVNDBid:JVNDB-2008-003896date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200803-208date:2008-03-13T00:00:00
db:NVDid:CVE-2007-6708date:2008-03-13T18:44:00