Vulnerability Description
Linksys WRT54g firmware 1.00.9 does not require credentials when making configuration changes, which allows remote attackers to modify arbitrary configurations via a direct request to Security.tri, as demonstrated using the SecurityMode and layout parameters, a different issue than CVE-2006-2559.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linksys | Wrt54G | 1.00.9 |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/048495.htmlExploit
- http://secunia.com/advisories/21372Vendor Advisory
- http://securitytracker.com/id?1016638Exploit
- http://www.kb.cert.org/vuls/id/930364US Government Resource
- http://www.securityfocus.com/bid/19347Exploit
- https://kinqpinz.info/lib/wrt54g/
- https://kinqpinz.info/lib/wrt54g/own2.txt
- https://www.exploit-db.com/exploits/5926
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/048495.htmlExploit
- http://secunia.com/advisories/21372Vendor Advisory
- http://securitytracker.com/id?1016638Exploit
- http://www.kb.cert.org/vuls/id/930364US Government Resource
- http://www.securityfocus.com/bid/19347Exploit
- https://kinqpinz.info/lib/wrt54g/
- https://kinqpinz.info/lib/wrt54g/own2.txt
FAQ
What is CVE-2006-5202?
CVE-2006-5202 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Linksys WRT54g firmware 1.00.9 does not require credentials when making configuration changes, which allows remote attackers to modify arbitrary configurations via a direct request to Security.tri, as...
How severe is CVE-2006-5202?
CVE-2006-5202 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5202?
Check the references section above for vendor advisories and patch information. Affected products include: Linksys Wrt54G.