Vulnerability Details : CVE-2008-1247
Potential exploit
The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote attackers to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) ctlog.tri, (5) ddns.tri, (6) dmz.tri, (7) factdefa.tri, (8) filter.tri, (9) fw.tri, (10) manage.tri, (11) ping.tri, (12) PortRange.tri, (13) ptrigger.tri, (14) qos.tri, (15) rstatus.tri, (16) tracert.tri, (17) vpn.tri, (18) WanMac.tri, (19) WBasic.tri, or (20) WFilter.tri. NOTE: the Security.tri vector is already covered by CVE-2006-5202.
Products affected by CVE-2008-1247
- cpe:2.3:h:linksys:wrt54g:*:*:1.00.9:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-1247
8.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-1247
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2008-1247
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1247
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41118
-
http://www.securityfocus.com/archive/1/489009/100/0/threaded
-
http://www.gnucitizen.org/projects/router-hacking-challenge/
Page not found ยท GitHub Pages
-
http://kinqpinz.info/lib/wrt54g/own.txt
Exploit
-
https://kinqpinz.info/lib/wrt54g/
-
http://www.securityfocus.com/bid/28381
-
http://secunia.com/advisories/29344
-
https://www.exploit-db.com/exploits/5926
-
https://www.exploit-db.com/exploits/5313
-
https://kinqpinz.info/lib/wrt54g/own2.txt
Jump to