Vulnerability Details : CVE-2011-4500
The UPnP IGD implementation on the Cisco Linksys WRT54GX with firmware 2.00.05, when UPnP is enabled, configures the SOAP server to listen on the WAN port, which allows remote attackers to administer the firewall via SOAP requests.
Products affected by CVE-2011-4500
- cpe:2.3:a:cisco:linksys_wrt54gx_router_firmware:2.00.05:*:*:*:*:*:*:*
- cpe:2.3:h:linksys:wrt54gx:2.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-4500
0.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-4500
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2011-4500
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-4500
-
http://www.kb.cert.org/vuls/id/357851
VU#357851 - UPnP requests accepted over router WAN interfacesUS Government Resource
-
http://www.upnp-hacks.org/devices.html
UPnP Hacks: Vulnerable UPnP IGD devices
Jump to