VAR-200605-0265

Vulnerability from variot - Updated: 2024-02-14 23:08

Linksys WRT54G Wireless-G Broadband Router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic. For example, use AddPortMapping to forward arbitrary traffic. WRT54G v4.0 is prone to a security bypass vulnerability.

TITLE: Linksys WRT54G UPnP Port Mapping Vulnerability

SECUNIA ADVISORY ID: SA20161

VERIFY ADVISORY: http://secunia.com/advisories/20161/

CRITICAL: Less critical

IMPACT: Security Bypass

WHERE:

From local network

OPERATING SYSTEM: Linksys WRT54G Wireless-G Broadband Router http://secunia.com/product/3523/

DESCRIPTION: Armijn Hemel has reported a vulnerability in Linksys WRT54G, which can be exploited by malicious people to bypass certain security restrictions.

The vulnerability is caused due to missing authentication of UPnP AddPortMapping requests and missing validation of the InternalClient parameter of the request. This can be exploited by hosts on the local network to configure port forwarding settings on the device to forward incoming traffic to arbitrary hosts without requiring authentication.

Successful exploitation may allow the device to be configured to forward traffic that is received on specific ports on the external interface to another host on the Internet.

SOLUTION: Update to firmware version 1.00.9. http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109974&packedargs=sku%3D1127782957298&pagename=Linksys%2FCommon%2FVisitorWrapper

PROVIDED AND/OR DISCOVERED BY: Armijn Hemel

ORIGINAL ADVISORY: http://www.securityview.org/how-does-the-upnp-flaw-works.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200605-0265",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "2.02.7"
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "3.03.6"
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "3.01.3"
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "2.00.8"
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "2.04.4"
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "2.04.4_non_default"
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "4.00.7"
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linksys",
        "version": "1.42.3"
      },
      {
        "model": "wrt54g v5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linksys",
        "version": "*"
      },
      {
        "model": "linksys",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wrt54g",
        "version": "1.42.3"
      },
      {
        "model": "linksys",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wrt54g",
        "version": "2.00.8"
      },
      {
        "model": "linksys",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wrt54g",
        "version": "2.02.7"
      },
      {
        "model": "linksys",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wrt54g",
        "version": "2.04.4"
      },
      {
        "model": "linksys 2.04.4 non default",
        "scope": null,
        "trust": 0.6,
        "vendor": "wrt54g",
        "version": null
      },
      {
        "model": "linksys",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wrt54g",
        "version": "3.01.3"
      },
      {
        "model": "linksys",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "wrt54g",
        "version": "3.03.6"
      },
      {
        "model": "wrt54g v5",
        "scope": null,
        "trust": 0.6,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "v4.04.0.7"
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "v3.03.3.6"
      },
      {
        "model": "wrt54g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "v2.02.00.8"
      },
      {
        "model": "wrt54g non default",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "v1.02.04.4"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-3375"
      },
      {
        "db": "BID",
        "id": "87619"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-446"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2559"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:linksys:wrt54g:2.04.4_non_default:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:linksys:wrt54g:2.04.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:linksys:wrt54g:2.02.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:linksys:wrt54g:4.00.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:linksys:wrt54g_v5:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:linksys:wrt54g:1.42.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:linksys:wrt54g:2.00.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-2559"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "87619"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2006-2559",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2006-3375",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-18667",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2006-2559",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2006-3375",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200605-446",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-18667",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-3375"
      },
      {
        "db": "VULHUB",
        "id": "VHN-18667"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-446"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2559"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linksys WRT54G Wireless-G Broadband Router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic. For example, use AddPortMapping to forward arbitrary traffic. WRT54G v4.0 is prone to a security bypass vulnerability. \n\nTITLE:\nLinksys WRT54G UPnP Port Mapping Vulnerability\n\nSECUNIA ADVISORY ID:\nSA20161\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/20161/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSecurity Bypass\n\nWHERE:\n\u003eFrom local network\n\nOPERATING SYSTEM:\nLinksys WRT54G Wireless-G Broadband Router\nhttp://secunia.com/product/3523/\n\nDESCRIPTION:\nArmijn Hemel has reported a vulnerability in Linksys WRT54G, which\ncan be exploited by malicious people to bypass certain security\nrestrictions. \n\nThe vulnerability is caused due to missing authentication of UPnP\nAddPortMapping requests and missing validation of the InternalClient\nparameter of the request. This can be exploited by hosts on the local\nnetwork to configure port forwarding settings on the device to forward\nincoming traffic to arbitrary hosts without requiring authentication. \n\nSuccessful exploitation may allow the device to be configured to\nforward traffic that is received on specific ports on the external\ninterface to another host on the Internet. \n\nSOLUTION:\nUpdate to firmware version 1.00.9. \nhttp://www.linksys.com/servlet/Satellite?c=L_Download_C2\u0026childpagename=US%2FLayout\u0026cid=1115417109974\u0026packedargs=sku%3D1127782957298\u0026pagename=Linksys%2FCommon%2FVisitorWrapper\n\nPROVIDED AND/OR DISCOVERED BY:\nArmijn Hemel\n\nORIGINAL ADVISORY:\nhttp://www.securityview.org/how-does-the-upnp-flaw-works.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-2559"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-3375"
      },
      {
        "db": "BID",
        "id": "87619"
      },
      {
        "db": "VULHUB",
        "id": "VHN-18667"
      },
      {
        "db": "PACKETSTORM",
        "id": "46538"
      }
    ],
    "trust": 1.89
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2006-2559",
        "trust": 2.6
      },
      {
        "db": "SECUNIA",
        "id": "20161",
        "trust": 2.4
      },
      {
        "db": "SECTRACK",
        "id": "1016134",
        "trust": 2.0
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-1909",
        "trust": 1.7
      },
      {
        "db": "XF",
        "id": "26707",
        "trust": 0.9
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-446",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-3375",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "87619",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-18667",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "46538",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-3375"
      },
      {
        "db": "VULHUB",
        "id": "VHN-18667"
      },
      {
        "db": "BID",
        "id": "87619"
      },
      {
        "db": "PACKETSTORM",
        "id": "46538"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-446"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2559"
      }
    ]
  },
  "id": "VAR-200605-0265",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-3375"
      },
      {
        "db": "VULHUB",
        "id": "VHN-18667"
      }
    ],
    "trust": 1.5451049
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-3375"
      }
    ]
  },
  "last_update_date": "2024-02-14T23:08:40.203000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-2559"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://secunia.com/advisories/20161"
      },
      {
        "trust": 2.1,
        "url": "http://www.securityview.org/how-does-the-upnp-flaw-works.html"
      },
      {
        "trust": 2.0,
        "url": "http://www.securityview.org/dutch-student-finds-a-bug-in-upnp.html"
      },
      {
        "trust": 2.0,
        "url": "http://securitytracker.com/id?1016134"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2006/1909"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26707"
      },
      {
        "trust": 0.9,
        "url": "http://xforce.iss.net/xforce/xfdb/26707"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/1909"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://www.linksys.com/servlet/satellite?c=l_download_c2\u0026childpagename=us%2flayout\u0026cid=1115417109974\u0026packedargs=sku%3d1127782957298\u0026pagename=linksys%2fcommon%2fvisitorwrapper"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3523/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/20161/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-3375"
      },
      {
        "db": "VULHUB",
        "id": "VHN-18667"
      },
      {
        "db": "BID",
        "id": "87619"
      },
      {
        "db": "PACKETSTORM",
        "id": "46538"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-446"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2559"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-3375"
      },
      {
        "db": "VULHUB",
        "id": "VHN-18667"
      },
      {
        "db": "BID",
        "id": "87619"
      },
      {
        "db": "PACKETSTORM",
        "id": "46538"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-446"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2559"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-05-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-3375"
      },
      {
        "date": "2006-05-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-18667"
      },
      {
        "date": "2006-05-23T00:00:00",
        "db": "BID",
        "id": "87619"
      },
      {
        "date": "2006-05-23T05:09:34",
        "db": "PACKETSTORM",
        "id": "46538"
      },
      {
        "date": "2006-05-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200605-446"
      },
      {
        "date": "2006-05-24T01:02:00",
        "db": "NVD",
        "id": "CVE-2006-2559"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-05-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-3375"
      },
      {
        "date": "2017-07-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-18667"
      },
      {
        "date": "2006-05-23T00:00:00",
        "db": "BID",
        "id": "87619"
      },
      {
        "date": "2006-05-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200605-446"
      },
      {
        "date": "2024-02-14T01:17:43.863000",
        "db": "NVD",
        "id": "CVE-2006-2559"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-446"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linksys WRT54G Wireless-G Broadband Router UPnP Request Access Control Bypass Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-3375"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "unknown",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-446"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…