Vulnerability Description
A directory traversal vulnerability exists in Linksys router's web interface (tested on the E1500 model firmware versions 1.0.00, 1.0.04, and 1.0.05), specifically in the /apply.cgi endpoint. Authenticated attackers can exploit the next_page POST parameter to access arbitrary files outside the intended web root by injecting traversal sequences. This allows exposure of sensitive system files and configuration data.
Related Weaknesses (CWE)
References
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/aux
- https://web.archive.org/web/20150428184015/http://www.s3cur1ty.de/m1adv2013-004
- https://www.exploit-db.com/exploits/24475
- https://www.vulncheck.com/advisories/linksys-legacy-routers-path-traversal
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/aux
- https://web.archive.org/web/20150428184015/http://www.s3cur1ty.de/m1adv2013-004
- https://www.exploit-db.com/exploits/24475
FAQ
What is CVE-2013-10062?
CVE-2013-10062 is a documented vulnerability. A directory traversal vulnerability exists in Linksys router's web interface (tested on the E1500 model firmware versions 1.0.00, 1.0.04, and 1.0.05), specifically in the /apply.cgi endpoint. Authenti...
How severe is CVE-2013-10062?
CVSS scoring is not yet available for CVE-2013-10062. Check NVD for updates.
Is there a patch for CVE-2013-10062?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.