ID
VAR-201102-0396
TITLE
Linksys WAP610N does not authorize root access security vulnerabilities
Trust: 0.6
DESCRIPTION
Linksys WAP610N is a wireless router. The Linksys WAP610N does not require authentication of the remote management console, allowing an attacker to run system commands as root. The Linksys WAP610N is prone to a security vulnerability that allows unauthenticated root access. An attacker can exploit this issue to gain unauthorized root access to affected devices. Successful exploits will result in the complete compromise of an affected device. Linksys WAP610N firmware versions 1.0.01 and 1.0.00 are vulnerable; other versions may also be affected
Trust: 0.81
IOT TAXONOMY
| category: | ['Network device'] | sub_category: | - | Trust: 0.6 |
AFFECTED PRODUCTS
| vendor: | cisco | model: | linksys wap610n | scope: | eq | version: | 1.0.1 | Trust: 0.9 |
| vendor: | cisco | model: | linksys wap610n | scope: | eq | version: | 1.0 | Trust: 0.3 |
THREAT TYPE
network
Trust: 0.3
TYPE
Design Error
Trust: 0.3
EXTERNAL IDS
| db: | BID | id: | 46305 | Trust: 0.9 |
| db: | CNVD | id: | CNVD-2011-0514 | Trust: 0.6 |
REFERENCES
| url: | http://www.securenetwork.it/ricerca/advisory/download/sn-2010-08.txt | Trust: 0.6 |
| url: | http://www.linksysbycisco.com/apac/en/home | Trust: 0.3 |
| url: | http://www.securenetwork.it/ricerca/advisory/download/sn-2010-08.txt | Trust: 0.3 |
CREDITS
Matteo Ignaccolo
Trust: 0.3
SOURCES
| db: | CNVD | id: | CNVD-2011-0514 |
| db: | BID | id: | 46305 |
LAST UPDATE DATE
2022-05-17T02:00:12.598000+00:00
SOURCES UPDATE DATE
| db: | CNVD | id: | CNVD-2011-0514 | date: | 2011-02-11T00:00:00 |
| db: | BID | id: | 46305 | date: | 2011-02-14T10:59:00 |
SOURCES RELEASE DATE
| db: | CNVD | id: | CNVD-2011-0514 | date: | 2011-02-11T00:00:00 |
| db: | BID | id: | 46305 | date: | 2011-02-10T00:00:00 |