ID
VAR-201102-0397
TITLE
Linksys WAG120N Wireless Router Cross-Site Request Forgery Vulnerability
Trust: 0.9
DESCRIPTION
The Linksys WAG120N Wireless Router is a wireless router. The Linksys WAG120N Wireless Router has a cross-site request forgery vulnerability that allows an attacker to construct a malicious link, entice a user to click, and change the user's password. Successful exploits may allow attackers to run privileged commands on the affected device, change configuration, cause denial-of-service conditions, or inject arbitrary script code. Other attacks are also possible
Trust: 0.81
IOT TAXONOMY
category: | ['Network device'] | sub_category: | - | Trust: 0.6 |
AFFECTED PRODUCTS
vendor: | linksys | model: | wireless-n home adsl2+ modem router wag120n | scope: | - | version: | - | Trust: 0.6 |
vendor: | linksys | model: | wireless-n home adsl2+ modem router wag120n | scope: | eq | version: | 0 | Trust: 0.3 |
THREAT TYPE
network
Trust: 0.3
TYPE
Design Error
Trust: 0.3
PATCH
title: | Linksys WAG120N Wireless Router Cross-Site Request Forgery Vulnerability Patch | url: | https://www.cnvd.org.cn/patchinfo/show/3105 | Trust: 0.6 |
EXTERNAL IDS
db: | BID | id: | 46571 | Trust: 0.9 |
db: | CNVD | id: | CNVD-2011-0799 | Trust: 0.6 |
REFERENCES
url: | http://comments.gmane.org/gmane.comp.security.oss.general/4149https | Trust: 0.6 |
url: | http://www.linksys.com/ | Trust: 0.3 |
url: | http://www.linksysbycisco.com/eu/en/support/wag120n | Trust: 0.3 |
url: | /archive/1/516689 | Trust: 0.3 |
CREDITS
Khashayar Fereidani
Trust: 0.3
SOURCES
db: | CNVD | id: | CNVD-2011-0799 |
db: | BID | id: | 46571 |
LAST UPDATE DATE
2022-05-17T02:09:59.869000+00:00
SOURCES UPDATE DATE
db: | CNVD | id: | CNVD-2011-0799 | date: | 2011-02-28T00:00:00 |
db: | BID | id: | 46571 | date: | 2011-02-25T00:00:00 |
SOURCES RELEASE DATE
db: | CNVD | id: | CNVD-2011-0799 | date: | 2011-02-28T00:00:00 |
db: | BID | id: | 46571 | date: | 2011-02-25T00:00:00 |