Vulnerability Details : CVE-2011-4500
The UPnP IGD implementation on the Cisco Linksys WRT54GX with firmware 2.00.05, when UPnP is enabled, configures the SOAP server to listen on the WAN port, which allows remote attackers to administer the firewall via SOAP requests.
Exploit prediction scoring system (EPSS) score for CVE-2011-4500
Probability of exploitation activity in the next 30 days: 0.26%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 65 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-4500
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2011-4500
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-4500
-
http://www.kb.cert.org/vuls/id/357851
VU#357851 - UPnP requests accepted over router WAN interfacesUS Government Resource
-
http://www.upnp-hacks.org/devices.html
UPnP Hacks: Vulnerable UPnP IGD devices
Products affected by CVE-2011-4500
- cpe:2.3:a:cisco:linksys_wrt54gx_router_firmware:2.00.05:*:*:*:*:*:*:*
- cpe:2.3:h:linksys:wrt54gx:2.0:*:*:*:*:*:*:*