ID

VAR-201102-0396


TITLE

Linksys WAP610N does not authorize root access security vulnerabilities

Trust: 0.6

sources: CNVD: CNVD-2011-0514

DESCRIPTION

Linksys WAP610N is a wireless router. The Linksys WAP610N does not require authentication of the remote management console, allowing an attacker to run system commands as root. The Linksys WAP610N is prone to a security vulnerability that allows unauthenticated root access. An attacker can exploit this issue to gain unauthorized root access to affected devices. Successful exploits will result in the complete compromise of an affected device. Linksys WAP610N firmware versions 1.0.01 and 1.0.00 are vulnerable; other versions may also be affected

Trust: 0.81

sources: CNVD: CNVD-2011-0514 // BID: 46305

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2011-0514

AFFECTED PRODUCTS

vendor:ciscomodel:linksys wap610nscope:eqversion:1.0.1

Trust: 0.9

vendor:ciscomodel:linksys wap610nscope:eqversion:1.0

Trust: 0.3

sources: CNVD: CNVD-2011-0514 // BID: 46305

THREAT TYPE

network

Trust: 0.3

sources: BID: 46305

TYPE

Design Error

Trust: 0.3

sources: BID: 46305

EXTERNAL IDS

db:BIDid:46305

Trust: 0.9

db:CNVDid:CNVD-2011-0514

Trust: 0.6

sources: CNVD: CNVD-2011-0514 // BID: 46305

REFERENCES

url:http://www.securenetwork.it/ricerca/advisory/download/sn-2010-08.txt

Trust: 0.6

url:http://www.linksysbycisco.com/apac/en/home

Trust: 0.3

url: http://www.securenetwork.it/ricerca/advisory/download/sn-2010-08.txt

Trust: 0.3

sources: CNVD: CNVD-2011-0514 // BID: 46305

CREDITS

Matteo Ignaccolo

Trust: 0.3

sources: BID: 46305

SOURCES

db:CNVDid:CNVD-2011-0514
db:BIDid:46305

LAST UPDATE DATE

2022-05-17T02:00:12.598000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-0514date:2011-02-11T00:00:00
db:BIDid:46305date:2011-02-14T10:59:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2011-0514date:2011-02-11T00:00:00
db:BIDid:46305date:2011-02-10T00:00:00