ID

VAR-201409-0056


CVE

CVE-2013-3064


TITLE

Linksys EA6500 Of firmware ui/dynamic/unsecured.html Open redirect vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2013-006646

DESCRIPTION

Open redirect vulnerability in ui/dynamic/unsecured.html in Linksys EA6500 with firmware 1.1.28.147876 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the target parameter. The Linksys EA6500 is a wireless router device. An attacker can leverage this issue by constructing a crafted URI and enticing a user to follow it. Other attacks are possible

Trust: 2.52

sources: NVD: CVE-2013-3064 // JVNDB: JVNDB-2013-006646 // CNVD: CNVD-2014-06827 // BID: 70287 // VULHUB: VHN-63066

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-06827

AFFECTED PRODUCTS

vendor:linksysmodel:ea6500scope:eqversion:1.1.28.147876

Trust: 1.9

vendor:linksysmodel:ea6500scope:eqversion: -

Trust: 1.0

vendor:cisco linksysmodel:ea6500scope: - version: -

Trust: 0.8

vendor:cisco linksysmodel:ea6500scope:eqversion:1.1.28.147876

Trust: 0.8

vendor:ciscomodel:linksys ea6500scope:eqversion:1.1.28.147876

Trust: 0.6

sources: CNVD: CNVD-2014-06827 // BID: 70287 // JVNDB: JVNDB-2013-006646 // CNNVD: CNNVD-201409-1108 // NVD: CVE-2013-3064

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-3064
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-3064
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-06827
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201409-1108
value: MEDIUM

Trust: 0.6

VULHUB: VHN-63066
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-3064
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-06827
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-63066
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-06827 // VULHUB: VHN-63066 // JVNDB: JVNDB-2013-006646 // CNNVD: CNNVD-201409-1108 // NVD: CVE-2013-3064

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2013-006646 // NVD: CVE-2013-3064

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201409-1108

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 70287

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-006646

PATCH

title:Linksys Home Networkingurl:http://www.linksys.com/en-apac/home

Trust: 0.8

sources: JVNDB: JVNDB-2013-006646

EXTERNAL IDS

db:NVDid:CVE-2013-3064

Trust: 3.4

db:BIDid:70287

Trust: 1.0

db:JVNDBid:JVNDB-2013-006646

Trust: 0.8

db:CNNVDid:CNNVD-201409-1108

Trust: 0.7

db:CNVDid:CNVD-2014-06827

Trust: 0.6

db:VULHUBid:VHN-63066

Trust: 0.1

sources: CNVD: CNVD-2014-06827 // VULHUB: VHN-63066 // BID: 70287 // JVNDB: JVNDB-2013-006646 // CNNVD: CNNVD-201409-1108 // NVD: CVE-2013-3064

REFERENCES

url:http://securityevaluators.com/knowledge/case_studies/routers/linksys_ea6500.php

Trust: 2.8

url:http://securityevaluators.com/knowledge/case_studies/routers/vulnerability_catalog.pdf

Trust: 2.6

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3064

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3064

Trust: 0.8

url:http://home.cisco.com/en-us/home

Trust: 0.3

sources: CNVD: CNVD-2014-06827 // VULHUB: VHN-63066 // BID: 70287 // JVNDB: JVNDB-2013-006646 // CNNVD: CNNVD-201409-1108 // NVD: CVE-2013-3064

CREDITS

Jacob Thompson

Trust: 0.3

sources: BID: 70287

SOURCES

db:CNVDid:CNVD-2014-06827
db:VULHUBid:VHN-63066
db:BIDid:70287
db:JVNDBid:JVNDB-2013-006646
db:CNNVDid:CNNVD-201409-1108
db:NVDid:CVE-2013-3064

LAST UPDATE DATE

2025-04-13T23:42:06.567000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-06827date:2014-10-16T00:00:00
db:VULHUBid:VHN-63066date:2014-09-30T00:00:00
db:BIDid:70287date:2014-09-29T00:00:00
db:JVNDBid:JVNDB-2013-006646date:2014-10-01T00:00:00
db:CNNVDid:CNNVD-201409-1108date:2014-09-30T00:00:00
db:NVDid:CVE-2013-3064date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-06827date:2014-10-16T00:00:00
db:VULHUBid:VHN-63066date:2014-09-29T00:00:00
db:BIDid:70287date:2014-09-29T00:00:00
db:JVNDBid:JVNDB-2013-006646date:2014-10-01T00:00:00
db:CNNVDid:CNNVD-201409-1108date:2014-09-30T00:00:00
db:NVDid:CVE-2013-3064date:2014-09-29T22:55:08.127