ID

VAR-200803-0008


CVE

CVE-2007-6709


TITLE

Cisco Linksys WAG54GS Wireless-G ADSL Gateway Vulnerabilities that gain access

Trust: 0.8

sources: JVNDB: JVNDB-2008-003897

DESCRIPTION

The Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and earlier firmware has "admin" as its default password for the "admin" account, which makes it easier for remote attackers to obtain access. Wireless-G ADSL Gateway WAG54GS is prone to a remote security vulnerability

Trust: 1.98

sources: NVD: CVE-2007-6709 // JVNDB: JVNDB-2008-003897 // BID: 85183 // VULHUB: VHN-30071

AFFECTED PRODUCTS

vendor:linksysmodel:wag54gsscope:lteversion:firmware_1.01.03

Trust: 1.0

vendor:cisco linksysmodel:wag54gsscope:lteversion:1.01.03

Trust: 0.8

vendor:linksysmodel:wag54gsscope:eqversion:firmware_1.01.03

Trust: 0.6

vendor:linksysmodel:wireless-g adsl gateway wag54gsscope:eqversion:1.01.03

Trust: 0.3

sources: BID: 85183 // JVNDB: JVNDB-2008-003897 // CNNVD: CNNVD-200803-209 // NVD: CVE-2007-6709

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-6709
value: HIGH

Trust: 1.0

NVD: CVE-2007-6709
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200803-209
value: HIGH

Trust: 0.6

VULHUB: VHN-30071
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-6709
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-30071
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-30071 // JVNDB: JVNDB-2008-003897 // CNNVD: CNNVD-200803-209 // NVD: CVE-2007-6709

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-30071 // JVNDB: JVNDB-2008-003897 // NVD: CVE-2007-6709

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200803-209

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200803-209

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-003897

PATCH

title:Linksysurl:http://home.cisco.com/en-apac/home

Trust: 0.8

sources: JVNDB: JVNDB-2008-003897

EXTERNAL IDS

db:NVDid:CVE-2007-6709

Trust: 2.8

db:OSVDBid:43536

Trust: 1.7

db:XFid:41268

Trust: 0.9

db:JVNDBid:JVNDB-2008-003897

Trust: 0.8

db:CNNVDid:CNNVD-200803-209

Trust: 0.7

db:BUGTRAQid:20080301 THE ROUTER HACKING CHALLENGE IS OVER!

Trust: 0.6

db:XFid:54

Trust: 0.6

db:BIDid:85183

Trust: 0.4

db:VULHUBid:VHN-30071

Trust: 0.1

sources: VULHUB: VHN-30071 // BID: 85183 // JVNDB: JVNDB-2008-003897 // CNNVD: CNNVD-200803-209 // NVD: CVE-2007-6709

REFERENCES

url:http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/

Trust: 2.0

url:http://www.gnucitizen.org/projects/router-hacking-challenge/

Trust: 2.0

url:http://osvdb.org/43536

Trust: 1.7

url:http://www.securityfocus.com/archive/1/489009/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41268

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/41268

Trust: 0.9

url:http://www.securityfocus.com/archive/1/archive/1/489009/100/0/threaded

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6709

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-6709

Trust: 0.8

sources: VULHUB: VHN-30071 // BID: 85183 // JVNDB: JVNDB-2008-003897 // CNNVD: CNNVD-200803-209 // NVD: CVE-2007-6709

CREDITS

Unknown

Trust: 0.3

sources: BID: 85183

SOURCES

db:VULHUBid:VHN-30071
db:BIDid:85183
db:JVNDBid:JVNDB-2008-003897
db:CNNVDid:CNNVD-200803-209
db:NVDid:CVE-2007-6709

LAST UPDATE DATE

2025-04-10T21:41:22.880000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-30071date:2018-10-15T00:00:00
db:BIDid:85183date:2008-03-13T00:00:00
db:JVNDBid:JVNDB-2008-003897date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200803-209date:2008-03-14T00:00:00
db:NVDid:CVE-2007-6709date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-30071date:2008-03-13T00:00:00
db:BIDid:85183date:2008-03-13T00:00:00
db:JVNDBid:JVNDB-2008-003897date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200803-209date:2008-03-13T00:00:00
db:NVDid:CVE-2007-6709date:2008-03-13T18:44:00