ID
VAR-201102-0396
TITLE
Linksys WAP610N does not authorize root access security vulnerabilities
Trust: 0.6
DESCRIPTION
Linksys WAP610N is a wireless router. The Linksys WAP610N does not require authentication of the remote management console, allowing an attacker to run system commands as root. The Linksys WAP610N is prone to a security vulnerability that allows unauthenticated root access. An attacker can exploit this issue to gain unauthorized root access to affected devices. Successful exploits will result in the complete compromise of an affected device. Linksys WAP610N firmware versions 1.0.01 and 1.0.00 are vulnerable; other versions may also be affected
Trust: 0.81
IOT TAXONOMY
category: | ['Network device'] | sub_category: | - | Trust: 0.6 |
AFFECTED PRODUCTS
vendor: | cisco | model: | linksys wap610n | scope: | eq | version: | 1.0.1 | Trust: 0.9 |
vendor: | cisco | model: | linksys wap610n | scope: | eq | version: | 1.0 | Trust: 0.3 |
THREAT TYPE
network
Trust: 0.3
TYPE
Design Error
Trust: 0.3
EXTERNAL IDS
db: | BID | id: | 46305 | Trust: 0.9 |
db: | CNVD | id: | CNVD-2011-0514 | Trust: 0.6 |
REFERENCES
url: | http://www.securenetwork.it/ricerca/advisory/download/sn-2010-08.txt | Trust: 0.6 |
url: | http://www.linksysbycisco.com/apac/en/home | Trust: 0.3 |
url: | http://www.securenetwork.it/ricerca/advisory/download/sn-2010-08.txt | Trust: 0.3 |
CREDITS
Matteo Ignaccolo
Trust: 0.3
SOURCES
db: | CNVD | id: | CNVD-2011-0514 |
db: | BID | id: | 46305 |
LAST UPDATE DATE
2022-05-17T02:00:12.598000+00:00
SOURCES UPDATE DATE
db: | CNVD | id: | CNVD-2011-0514 | date: | 2011-02-11T00:00:00 |
db: | BID | id: | 46305 | date: | 2011-02-14T10:59:00 |
SOURCES RELEASE DATE
db: | CNVD | id: | CNVD-2011-0514 | date: | 2011-02-11T00:00:00 |
db: | BID | id: | 46305 | date: | 2011-02-10T00:00:00 |