Lucene search

K
LinksysWrt54g3.03.6

5 matches found

CVE
CVE
added 2005/09/15 8:3 p.m.136 views

CVE-2005-2799

Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions before 4.20.7, allows remote attackers to execute arbitrary code via a long HTTP POST request.

7.5CVSS7.8AI score0.85392EPSS
CVE
CVE
added 2005/09/14 9:3 p.m.48 views

CVE-2005-2915

ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, uses weak encryption (XOR encoding with a fixed byte mask) for configuration information, which could allow attackers to decrypt the information and possibly re-encrypt it in co...

5CVSS6.4AI score0.00757EPSS
CVE
CVE
added 2005/09/14 9:3 p.m.44 views

CVE-2005-2914

ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote attackers to obtain encrypted configuration information and, if the key is known, modify the configur...

7.5CVSS6.6AI score0.00757EPSS
CVE
CVE
added 2005/09/14 9:3 p.m.41 views

CVE-2005-2916

Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) upload new firmware using upgrade.cgi.

5CVSS7.2AI score0.00476EPSS
CVE
CVE
added 2005/09/14 9:3 p.m.40 views

CVE-2005-2912

Linksys WRT54G router allows remote attackers to cause a denial of service (CPU consumption and server hang) via an HTTP POST request with a negative Content-Length value.

5CVSS6.7AI score0.00655EPSS