Vulnerability Description
The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and earlier allow remote attackers to obtain sensitive information (passwords and configuration data) via a packet to UDP port 916. NOTE: some of these details are obtained from third party information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linksys | Wag200G | 1.01.01 |
| Linksys | Wrt54Gc | <= 1.03.0 |
References
- http://marc.info/?l=bugtraq&m=117492736903388&w=2
- http://secunia.com/advisories/24658
- http://www.securityfocus.com/archive/1/463342/100/0/threaded
- http://www.securityfocus.com/bid/23063
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33251
- http://marc.info/?l=bugtraq&m=117492736903388&w=2
- http://secunia.com/advisories/24658
- http://www.securityfocus.com/archive/1/463342/100/0/threaded
- http://www.securityfocus.com/bid/23063
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33251
FAQ
What is CVE-2007-1585?
CVE-2007-1585 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The Linksys WAG200G with firmware 1.01.01, WRT54GC 2 with firmware 1.00.7, and WRT54GC 1 with firmware 1.03.0 and earlier allow remote attackers to obtain sensitive information (passwords and configur...
How severe is CVE-2007-1585?
CVE-2007-1585 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1585?
Check the references section above for vendor advisories and patch information. Affected products include: Linksys Wag200G, Linksys Wrt54Gc.