Show filters
100 Total Results
Displaying 21-30 of 100
Sort by:
Attacker Value
Unknown

CVE-2020-35714

Disclosure Date: December 26, 2020 (last updated February 22, 2025)
Belkin LINKSYS RE6500 devices before 1.0.11.001 allow remote authenticated users to execute arbitrary commands via goform/systemCommand?command= in conjunction with the goform/pingstart program.
Attacker Value
Unknown

CVE-2020-35713

Disclosure Date: December 26, 2020 (last updated February 22, 2025)
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
Attacker Value
Unknown

CVE-2009-5140

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
The SIP implementation on the Linksys SPA2102 phone adapter provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.
Attacker Value
Unknown

CVE-2013-3067

Disclosure Date: February 07, 2020 (last updated February 21, 2025)
Linksys WRT310Nv2 2.0.0.1 is vulnerable to XSS.
Attacker Value
Unknown

CVE-2013-4658

Disclosure Date: October 25, 2019 (last updated November 27, 2024)
Linksys EA6500 has SMB Symlink Traversal allowing symbolic links to be created to locations outside of the Samba share.
Attacker Value
Unknown

CVE-2019-16340

Disclosure Date: August 21, 2019 (last updated November 27, 2024)
Belkin Linksys Velop 1.1.8.192419 devices allows remote attackers to discover the recovery key via a direct request for the /sysinfo_json.cgi URI.
Attacker Value
Unknown

CVE-2019-11535

Disclosure Date: July 17, 2019 (last updated November 27, 2024)
Unsanitized user input in the web interface for Linksys WiFi extender products (RE6400 and RE6300 through 1.2.04.022) allows for remote command execution. An attacker can access system OS configurations and commands that are not intended for use beyond the web UI.
0
Attacker Value
Unknown

CVE-2019-7579

Disclosure Date: June 17, 2019 (last updated November 27, 2024)
An issue was discovered on Linksys WRT1900ACS 1.0.3.187766 devices. An ability exists for an unauthenticated user to browse a confidential ui/1.0.99.187766/dynamic/js/setup.js.localized file on the router's webserver, allowing for an attacker to identify possible passwords that the system uses to set the default guest network password. An attacker can use this list of 30 words along with a random 2 digit number to brute force their access onto a router's guest network.
0
Attacker Value
Unknown

CVE-2009-5157

Disclosure Date: June 11, 2019 (last updated November 27, 2024)
On Linksys WAG54G2 1.00.10 devices, there is authenticated command injection via shell metacharacters in the setup.cgi c4_ping_ipaddr variable.
0
Attacker Value
Unknown

CVE-2019-7311

Disclosure Date: June 06, 2019 (last updated November 27, 2024)
An issue was discovered on Linksys WRT1900ACS 1.0.3.187766 devices. A lack of encryption in how the user login cookie (admin-auth) is stored on a victim's computer results in the admin password being discoverable by a local attacker, and usable to gain administrative access to the victim's router. The admin password is stored in base64 cleartext in an "admin-auth" cookie. An attacker sniffing the network at the time of login could acquire the router's admin password. Alternatively, gaining physical access to the victim's computer soon after an administrative login could result in compromise.
0