ID
VAR-201301-0469
TITLE
Cisco Linksys WRT54GL Router Multiple Security Vulnerabilities
Trust: 0.9
DESCRIPTION
Allows an attacker to perform malicious actions. The Cisco Linksys WRT54GL Router is a wireless routing device. A security vulnerability exists in the Cisco Linksys WRT54GL Router. Due to the lack of filtering on the wan_hostnam parameter, an attacker can exploit the vulnerability to inject and execute arbitrary shell commands. Since changing the current password does not require providing current password information, an attacker is allowed to submit a malicious request to change the password information. A command-execution vulnerability 2. A security-bypass vulnerability 3. A cross-site request-forgery vulnerability 4. A cross-site scripting vulnerability 5. Cisco Linksys WRT54GL 1.1 running firmware version 4.30.15 build 2 is vulnerable; other versions may also be affected
Trust: 2.43
IOT TAXONOMY
| category: | ['Network device'] | sub_category: | - | Trust: 2.4 |
AFFECTED PRODUCTS
| vendor: | cisco | model: | linksys wrt54gl router build | scope: | eq | version: | 4.30.152 | Trust: 2.4 |
THREAT TYPE
remote
Trust: 0.6
TYPE
Input Validation Error
Trust: 0.3
PATCH
| title: | Patch for Cisco Linksys WRT54GL Router Cross-Site Request Forgery Vulnerability | url: | https://www.cnvd.org.cn/patchinfo/show/30351 | Trust: 0.6 |
| title: | Cisco Linksys WRT54GL Router 'wan_hostnam' command to execute the patch for the vulnerability | url: | https://www.cnvd.org.cn/patchinfo/show/30312 | Trust: 0.6 |
| title: | Patch for Cisco Linksys WRT54GL Router Cross-Site Scripting Vulnerability | url: | https://www.cnvd.org.cn/patchinfo/show/30371 | Trust: 0.6 |
| title: | Cisco Linksys WRT54GL Router Security Bypass Vulnerability Patch | url: | https://www.cnvd.org.cn/patchinfo/show/30332 | Trust: 0.6 |
EXTERNAL IDS
| db: | BID | id: | 57459 | Trust: 3.3 |
| db: | EXPLOIT-DB | id: | 24202 | Trust: 2.4 |
| db: | CNVD | id: | CNVD-2013-00452 | Trust: 0.6 |
| db: | CNVD | id: | CNVD-2013-00448 | Trust: 0.6 |
| db: | CNVD | id: | CNVD-2013-00454 | Trust: 0.6 |
| db: | CNVD | id: | CNVD-2013-00450 | Trust: 0.6 |
| db: | CNNVD | id: | CNNVD-201301-398 | Trust: 0.6 |
REFERENCES
| url: | http://www.exploit-db.com/exploits/24202/ | Trust: 2.4 |
| url: | http://www.securityfocus.com/bid/57459 | Trust: 0.6 |
CREDITS
m-1-k-3
Trust: 0.9
SOURCES
| db: | CNVD | id: | CNVD-2013-00452 |
| db: | CNVD | id: | CNVD-2013-00448 |
| db: | CNVD | id: | CNVD-2013-00454 |
| db: | CNVD | id: | CNVD-2013-00450 |
| db: | BID | id: | 57459 |
| db: | CNNVD | id: | CNNVD-201301-398 |
LAST UPDATE DATE
2022-05-17T02:09:07.483000+00:00
SOURCES UPDATE DATE
| db: | CNVD | id: | CNVD-2013-00452 | date: | 2013-01-23T00:00:00 |
| db: | CNVD | id: | CNVD-2013-00448 | date: | 2013-01-23T00:00:00 |
| db: | CNVD | id: | CNVD-2013-00454 | date: | 2013-05-23T00:00:00 |
| db: | CNVD | id: | CNVD-2013-00450 | date: | 2013-01-23T00:00:00 |
| db: | BID | id: | 57459 | date: | 2013-04-10T06:18:00 |
| db: | CNNVD | id: | CNNVD-201301-398 | date: | 2013-01-22T00:00:00 |
SOURCES RELEASE DATE
| db: | CNVD | id: | CNVD-2013-00452 | date: | 2013-01-23T00:00:00 |
| db: | CNVD | id: | CNVD-2013-00448 | date: | 2013-01-23T00:00:00 |
| db: | CNVD | id: | CNVD-2013-00454 | date: | 2013-01-23T00:00:00 |
| db: | CNVD | id: | CNVD-2013-00450 | date: | 2013-01-23T00:00:00 |
| db: | BID | id: | 57459 | date: | 2013-01-18T00:00:00 |
| db: | CNNVD | id: | CNNVD-201301-398 | date: | 2013-01-22T00:00:00 |