NONE · 0

CVE-2014-125122

A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request...

Vulnerability Description

A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker can overwrite memory in a controlled manner, enabling them to temporarily reset the administrator password of the device to a blank value. This grants unauthorized access to the router’s web management interface without requiring valid credentials.

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-125122?

CVE-2014-125122 is a documented vulnerability. A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request...

How severe is CVE-2014-125122?

CVSS scoring is not yet available for CVE-2014-125122. Check NVD for updates.

Is there a patch for CVE-2014-125122?

Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.