CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
74.8%
Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote attackers to obtain the administrator’s MD5 password hash via a direct request for the /.htpasswd URI.
Vendor | Product | Version | CPE |
---|---|---|---|
linksys | ea4500_firmware | * | cpe:2.3:o:linksys:ea4500_firmware:*:*:*:*:*:*:*:* |
linksys | ea4500 | - | cpe:2.3:h:linksys:ea4500:-:*:*:*:*:*:*:* |
linksys | ea6500_firmware | * | cpe:2.3:o:linksys:ea6500_firmware:*:153731:*:*:*:*:*:* |
linksys | ea6500 | - | cpe:2.3:h:linksys:ea6500:-:*:*:*:*:*:*:* |
linksys | ea6400_firmware | * | cpe:2.3:o:linksys:ea6400_firmware:*:153731:*:*:*:*:*:* |
linksys | ea6400 | - | cpe:2.3:h:linksys:ea6400:-:*:*:*:*:*:*:* |
linksys | e4200v2_firmware | * | cpe:2.3:o:linksys:e4200v2_firmware:*:*:*:*:*:*:*:* |
linksys | e4200v2 | - | cpe:2.3:h:linksys:e4200v2:-:*:*:*:*:*:*:* |
linksys | ea6300_firmware | * | cpe:2.3:o:linksys:ea6300_firmware:*:153731:*:*:*:*:*:* |
linksys | ea6300 | - | cpe:2.3:h:linksys:ea6300:-:*:*:*:*:*:*:* |