CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
83.8%
Linksys WRT54G Wireless-G Broadband Router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic.
Vendor | Product | Version | CPE |
---|---|---|---|
linksys | wrt54g | 1.42.3 | cpe:2.3:h:linksys:wrt54g:1.42.3:*:*:*:*:*:*:* |
linksys | wrt54g | 2.00.8 | cpe:2.3:h:linksys:wrt54g:2.00.8:*:*:*:*:*:*:* |
linksys | wrt54g | 2.02.7 | cpe:2.3:h:linksys:wrt54g:2.02.7:*:*:*:*:*:*:* |
linksys | wrt54g | 2.04.4 | cpe:2.3:h:linksys:wrt54g:2.04.4:*:*:*:*:*:*:* |
linksys | wrt54g | 2.04.4_non_default | cpe:2.3:h:linksys:wrt54g:2.04.4_non_default:*:*:*:*:*:*:* |
linksys | wrt54g | 3.01.3 | cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:* |
linksys | wrt54g | 3.03.6 | cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:* |
linksys | wrt54g | 4.00.7 | cpe:2.3:h:linksys:wrt54g:4.00.7:*:*:*:*:*:*:* |
linksys | wrt54g_v5 | * | cpe:2.3:h:linksys:wrt54g_v5:*:*:*:*:*:*:*:* |