ID

VAR-200905-0191


CVE

CVE-2009-1559


TITLE

Cisco Linksys WVC54GCA On wireless camcorder adm/file.cgi Vulnerable to absolute path traversal

Trust: 0.8

sources: JVNDB: JVNDB-2009-003393

DESCRIPTION

Absolute path traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R24 and possibly 1.00R22 allows remote attackers to read arbitrary files via an absolute pathname in the this_file parameter. NOTE: traversal via a .. (dot dot) is probably also possible. Wvc54gca is prone to a directory traversal vulnerability. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera is prone to multiple directory-traversal vulnerabilities because the software fails to sufficiently sanitize user-supplied input. An attacker can exploit these issues using directory-traversal strings ('../') to download arbitrary files with the privileges of the server process. Information obtained may aid in further attacks. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. The Linksys WVC54GCA is a wireless network camera

Trust: 2.25

sources: NVD: CVE-2009-1559 // JVNDB: JVNDB-2009-003393 // BID: 79495 // BID: 34713 // VULHUB: VHN-39005

IOT TAXONOMY

category:['camera device']sub_category:video camera

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:ciscomodel:wvc54gcascope:eqversion:1.00r24

Trust: 1.6

vendor:ciscomodel:wvc54gcascope:eqversion:1.00r22

Trust: 1.6

vendor:ciscomodel:wvc54gcascope:eqversion:1.00r22 and 1.00r24

Trust: 0.8

vendor:ciscomodel:wvc54gca 1.00r24scope: - version: -

Trust: 0.3

vendor:ciscomodel:wvc54gca 1.00r22scope: - version: -

Trust: 0.3

vendor:linksysmodel:wvc54gca 1.00r24scope: - version: -

Trust: 0.3

vendor:linksysmodel:wvc54gca 1.00r22scope: - version: -

Trust: 0.3

sources: BID: 79495 // BID: 34713 // JVNDB: JVNDB-2009-003393 // CNNVD: CNNVD-200905-073 // NVD: CVE-2009-1559

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-1559
value: HIGH

Trust: 1.0

NVD: CVE-2009-1559
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200905-073
value: HIGH

Trust: 0.6

VULHUB: VHN-39005
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-1559
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-39005
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-39005 // JVNDB: JVNDB-2009-003393 // CNNVD: CNNVD-200905-073 // NVD: CVE-2009-1559

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-39005 // JVNDB: JVNDB-2009-003393 // NVD: CVE-2009-1559

THREAT TYPE

network

Trust: 0.6

sources: BID: 79495 // BID: 34713

TYPE

Input Validation Error

Trust: 0.6

sources: BID: 79495 // BID: 34713

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-003393

PATCH

title:Top Pageurl:https://www.cisco.com/

Trust: 0.8

sources: JVNDB: JVNDB-2009-003393

EXTERNAL IDS

db:NVDid:CVE-2009-1559

Trust: 2.9

db:BIDid:34713

Trust: 2.3

db:VUPENid:ADV-2009-1173

Trust: 1.7

db:XFid:50231

Trust: 0.9

db:JVNDBid:JVNDB-2009-003393

Trust: 0.8

db:XFid:54

Trust: 0.6

db:CNNVDid:CNNVD-200905-073

Trust: 0.6

db:BIDid:79495

Trust: 0.4

db:OTHERid:NONE

Trust: 0.1

db:VULHUBid:VHN-39005

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-39005 // BID: 79495 // BID: 34713 // JVNDB: JVNDB-2009-003393 // CNNVD: CNNVD-200905-073 // NVD: CVE-2009-1559

REFERENCES

url:http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/

Trust: 2.3

url:http://www.securityfocus.com/bid/34713

Trust: 2.0

url:http://www.vupen.com/english/advisories/2009/1173

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/50231

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/50231

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1559

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1559

Trust: 0.8

url:http://www.linksysbycisco.com/us/en/products/wvc54gca

Trust: 0.3

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-39005 // BID: 79495 // BID: 34713 // JVNDB: JVNDB-2009-003393 // CNNVD: CNNVD-200905-073 // NVD: CVE-2009-1559

CREDITS

pagvac

Trust: 0.9

sources: BID: 34713 // CNNVD: CNNVD-200905-073

SOURCES

db:OTHERid: -
db:VULHUBid:VHN-39005
db:BIDid:79495
db:BIDid:34713
db:JVNDBid:JVNDB-2009-003393
db:CNNVDid:CNNVD-200905-073
db:NVDid:CVE-2009-1559

LAST UPDATE DATE

2025-04-10T19:54:32.114000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-39005date:2017-08-17T00:00:00
db:BIDid:79495date:2009-05-06T00:00:00
db:BIDid:34713date:2009-04-27T13:36:00
db:JVNDBid:JVNDB-2009-003393date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200905-073date:2009-05-08T00:00:00
db:NVDid:CVE-2009-1559date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-39005date:2009-05-06T00:00:00
db:BIDid:79495date:2009-05-06T00:00:00
db:BIDid:34713date:2009-04-23T00:00:00
db:JVNDBid:JVNDB-2009-003393date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200905-073date:2009-04-23T00:00:00
db:NVDid:CVE-2009-1559date:2009-05-06T16:30:00.657