ID

VAR-200905-0190


CVE

CVE-2009-1558


TITLE

Cisco Linksys WVC54GCA Wireless camcorder adm/file.cgi Vulnerable to directory traversal

Trust: 0.8

sources: JVNDB: JVNDB-2009-003392

DESCRIPTION

Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera is prone to multiple directory-traversal vulnerabilities because the software fails to sufficiently sanitize user-supplied input. An attacker can exploit these issues using directory-traversal strings ('../') to download arbitrary files with the privileges of the server process. Information obtained may aid in further attacks. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. The Linksys WVC54GCA is a wireless network camera

Trust: 2.07

sources: NVD: CVE-2009-1558 // JVNDB: JVNDB-2009-003392 // BID: 34713 // VULHUB: VHN-39004 // VULMON: CVE-2009-1558

IOT TAXONOMY

category:['camera device']sub_category:video camera

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:ciscomodel:wvc54gcascope:eqversion:1.00r24

Trust: 1.6

vendor:ciscomodel:wvc54gcascope:eqversion:1.00r22

Trust: 1.6

vendor:ciscomodel:wvc54gcascope:eqversion:1.00r22 and 1.00r24

Trust: 0.8

vendor:linksysmodel:wvc54gca 1.00r24scope: - version: -

Trust: 0.3

vendor:linksysmodel:wvc54gca 1.00r22scope: - version: -

Trust: 0.3

sources: BID: 34713 // JVNDB: JVNDB-2009-003392 // CNNVD: CNNVD-200905-072 // NVD: CVE-2009-1558

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-1558
value: HIGH

Trust: 1.0

NVD: CVE-2009-1558
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200905-072
value: HIGH

Trust: 0.6

VULHUB: VHN-39004
value: HIGH

Trust: 0.1

VULMON: CVE-2009-1558
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-1558
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-39004
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-39004 // VULMON: CVE-2009-1558 // JVNDB: JVNDB-2009-003392 // CNNVD: CNNVD-200905-072 // NVD: CVE-2009-1558

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-39004 // JVNDB: JVNDB-2009-003392 // NVD: CVE-2009-1558

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200905-072

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-200905-072

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-003392

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-39004 // VULMON: CVE-2009-1558

PATCH

title:Top Pageurl:https://www.cisco.com/

Trust: 0.8

title:Kenzer Templates [5170] [DEPRECATED]url:https://github.com/ARPSyndicate/kenzer-templates

Trust: 0.1

sources: VULMON: CVE-2009-1558 // JVNDB: JVNDB-2009-003392

EXTERNAL IDS

db:NVDid:CVE-2009-1558

Trust: 2.7

db:BIDid:34713

Trust: 2.1

db:VUPENid:ADV-2009-1173

Trust: 1.8

db:JVNDBid:JVNDB-2009-003392

Trust: 0.8

db:XFid:54

Trust: 0.6

db:XFid:50231

Trust: 0.6

db:CNNVDid:CNNVD-200905-072

Trust: 0.6

db:EXPLOIT-DBid:32954

Trust: 0.2

db:OTHERid:NONE

Trust: 0.1

db:SEEBUGid:SSVID-86215

Trust: 0.1

db:VULHUBid:VHN-39004

Trust: 0.1

db:VULMONid:CVE-2009-1558

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-39004 // VULMON: CVE-2009-1558 // BID: 34713 // JVNDB: JVNDB-2009-003392 // CNNVD: CNNVD-200905-072 // NVD: CVE-2009-1558

REFERENCES

url:http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/

Trust: 2.1

url:http://www.securityfocus.com/bid/34713

Trust: 1.8

url:http://www.vupen.com/english/advisories/2009/1173

Trust: 1.8

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/50231

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1558

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1558

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/50231

Trust: 0.6

url:http://www.linksysbycisco.com/us/en/products/wvc54gca

Trust: 0.3

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/22.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/32954/

Trust: 0.1

url:https://github.com/arpsyndicate/kenzer-templates

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-39004 // VULMON: CVE-2009-1558 // BID: 34713 // JVNDB: JVNDB-2009-003392 // CNNVD: CNNVD-200905-072 // NVD: CVE-2009-1558

CREDITS

pagvac

Trust: 0.9

sources: BID: 34713 // CNNVD: CNNVD-200905-072

SOURCES

db:OTHERid: -
db:VULHUBid:VHN-39004
db:VULMONid:CVE-2009-1558
db:BIDid:34713
db:JVNDBid:JVNDB-2009-003392
db:CNNVDid:CNNVD-200905-072
db:NVDid:CVE-2009-1558

LAST UPDATE DATE

2025-04-10T20:49:26.486000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-39004date:2017-08-17T00:00:00
db:VULMONid:CVE-2009-1558date:2017-08-17T00:00:00
db:BIDid:34713date:2009-04-27T13:36:00
db:JVNDBid:JVNDB-2009-003392date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200905-072date:2009-05-08T00:00:00
db:NVDid:CVE-2009-1558date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-39004date:2009-05-06T00:00:00
db:VULMONid:CVE-2009-1558date:2009-05-06T00:00:00
db:BIDid:34713date:2009-04-23T00:00:00
db:JVNDBid:JVNDB-2009-003392date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200905-072date:2009-04-23T00:00:00
db:NVDid:CVE-2009-1558date:2009-05-06T16:30:00.627