VAR-200905-0189

Vulnerability from variot - Updated: 2023-12-18 11:20

Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allow remote attackers to inject arbitrary web script or HTML via the next_file parameter to (1) main.cgi, (2) img/main.cgi, or (3) adm/file.cgi; or (4) the this_file parameter to adm/file.cgi. The Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control contains a stack buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. (1) main.cgi To next_file Parameters (2) img/main.cgi To next_file Parameters (3) adm/file.cgi To next_file Parameters (4) adm/file.cgi To this_file Parameters. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. Linksys WVC54GCA is a wireless network camera. Remote attackers can send The camera's console submits a malicious request to perform a cross-site scripting attack. ----------------------------------------------------------------------

Secunia is pleased to announce the release of the annual Secunia report for 2008.

Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics

Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/

Stay Secure,

Secunia


TITLE: Linksys WVC54GCA Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA34767

VERIFY ADVISORY: http://secunia.com/advisories/34767/

DESCRIPTION: pagvac has reported some vulnerabilities in Linksys WVC54GCA, which can be exploited by malicious people to disclose sensitive information or conduct cross-site scripting attacks, and by malicious users to bypass certain security restrictions.

1) The device sends e.g. login credentials in plain text after receiving a specially crafted UDP packet.

This is related to vulnerability #1 in: SA33032

2) Input passed to the "next_file" parameter in img/main.cgi is not properly verified before being used to read files. This can be exploited to read the .htpasswd file from the current directory and disclose the administrator's password.

Successful exploitation of this vulnerability requires valid user credentials.

3) Input passed to the "next_file" parameter in img/main.cgi, main.cgi, and adm/file.cgi is not properly sanitised before being returned to the user.

The vulnerabilities are reported in firmware versions 1.00R22 and 1.00R24. Other versions may also be affected.

SOLUTION: Use the product in trusted networks only.

Filter malicious characters and character sequences in a web proxy.

PROVIDED AND/OR DISCOVERED BY: pagvac

ORIGINAL ADVISORY: http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/ http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/ http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/

OTHER REFERENCES: SA33032: http://secunia.com/advisories/33032/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


.

1) A security issue is caused due to the device sending certain information (e.g. This can be exploited to gain access to sensitive information by sending a specially crafted packet to a vulnerable device.

2) A vulnerability is caused due to a boundary error in the "SetSource()" method of the NetCamPlayerWeb11gv2 ActiveX control (NetCamPlayerWeb11gv2.ocx). This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into visiting a malicious website.

SOLUTION: Update to version 1.25.

PROVIDED AND/OR DISCOVERED BY: US-CERT credits Greg Linares, eEye

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200905-0189",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "linksys a division of cisco",
        "version": null
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.00r22"
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.00r24"
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "1.00r22 and  1.00r24"
      },
      {
        "model": "wvc54gca 1.00r24",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "wvc54gca 1.00r22",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "BID",
        "id": "34714"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:cisco:wvc54gca:1.00r24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "pagvac",
    "sources": [
      {
        "db": "BID",
        "id": "34714"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2009-1557",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2009-1557",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-39003",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2009-1557",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#639345",
            "trust": 0.8,
            "value": "2.73"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#528993",
            "trust": 0.8,
            "value": "1.59"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200905-071",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-39003",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allow remote attackers to inject arbitrary web script or HTML via the next_file parameter to (1) main.cgi, (2) img/main.cgi, or (3) adm/file.cgi; or (4) the this_file parameter to adm/file.cgi. The Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control contains a stack buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. (1) main.cgi To next_file Parameters (2) img/main.cgi To next_file Parameters (3) adm/file.cgi To next_file Parameters (4) adm/file.cgi To this_file Parameters. \nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. \nLinksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. Linksys WVC54GCA is a wireless network camera. Remote attackers can send The camera\u0027s console submits a malicious request to perform a cross-site scripting attack. ----------------------------------------------------------------------\n\nSecunia is pleased to announce the release of the annual Secunia\nreport for 2008. \n\nHighlights from the 2008 report:\n * Vulnerability Research\n * Software Inspection Results\n * Secunia Research Highlights\n * Secunia Advisory Statistics\n\nRequest the full 2008 Report here:\nhttp://secunia.com/advisories/try_vi/request_2008_report/\n\nStay Secure,\n\nSecunia\n\n\n----------------------------------------------------------------------\n\nTITLE:\nLinksys WVC54GCA Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA34767\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/34767/\n\nDESCRIPTION:\npagvac has reported some vulnerabilities in Linksys WVC54GCA, which\ncan be exploited by malicious people to disclose sensitive\ninformation or conduct cross-site scripting attacks, and by malicious\nusers to bypass certain security restrictions. \n\n1) The device sends e.g. login credentials in plain text after\nreceiving a specially crafted UDP packet. \n\nThis is related to vulnerability #1 in:\nSA33032\n\n2) Input passed to the \"next_file\" parameter in img/main.cgi is not\nproperly verified before being used to read files. This can be\nexploited to read the .htpasswd file from the current directory and\ndisclose the administrator\u0027s password. \n\nSuccessful exploitation of this vulnerability requires valid user\ncredentials. \n\n3) Input passed to the \"next_file\" parameter in img/main.cgi,\nmain.cgi, and adm/file.cgi is not properly sanitised before being\nreturned to the user. \n\nThe vulnerabilities are reported in firmware versions 1.00R22 and\n1.00R24. Other versions may also be affected. \n\nSOLUTION:\nUse the product in trusted networks only. \n\nFilter malicious characters and character sequences in a web proxy. \n\nPROVIDED AND/OR DISCOVERED BY:\npagvac\n\nORIGINAL ADVISORY:\nhttp://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/\nhttp://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/\nhttp://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/\n\nOTHER REFERENCES:\nSA33032:\nhttp://secunia.com/advisories/33032/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\n1) A security issue is caused due to the device sending certain\ninformation (e.g. This can be exploited to\ngain access to sensitive information by sending a specially crafted\npacket to a vulnerable device. \n\n2) A vulnerability is caused due to a boundary error in the\n\"SetSource()\" method of the NetCamPlayerWeb11gv2 ActiveX control\n(NetCamPlayerWeb11gv2.ocx). This can be exploited to cause a\nstack-based buffer overflow by e.g. tricking a user into visiting a\nmalicious website. \n\nSOLUTION:\nUpdate to version 1.25. \n\nPROVIDED AND/OR DISCOVERED BY:\nUS-CERT credits Greg Linares, eEye",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "BID",
        "id": "34714"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      }
    ],
    "trust": 3.6
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-39003",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-1557",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "34714",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "34767",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1173",
        "trust": 1.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "50224",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "54",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071",
        "trust": 0.6
      },
      {
        "db": "SECUNIA",
        "id": "33032",
        "trust": 0.2
      },
      {
        "db": "EXPLOIT-DB",
        "id": "32955",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-86216",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "76983",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "72709",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "db": "BID",
        "id": "34714"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ]
  },
  "id": "VAR-200905-0189",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T11:20:36.654000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/34714"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/34767"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2009/1173"
      },
      {
        "trust": 1.6,
        "url": "about vulnerability notes"
      },
      {
        "trust": 1.6,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 1.6,
        "url": "provide a vendor statement"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50224"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1557"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1557"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/50224"
      },
      {
        "trust": 0.3,
        "url": "http://www.linksysbycisco.com/us/en/products/wvc54gca"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/33032/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/"
      },
      {
        "trust": 0.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/34767/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/try_vi/request_2008_report/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/528993"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/639345"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/20682/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "db": "BID",
        "id": "34714"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "db": "BID",
        "id": "34714"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "date": "2009-05-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "date": "2009-04-25T00:00:00",
        "db": "BID",
        "id": "34714"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "date": "2009-04-27T15:17:22",
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "date": "2008-12-08T17:18:51",
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "date": "2009-05-06T16:30:00.610000",
        "db": "NVD",
        "id": "CVE-2009-1557"
      },
      {
        "date": "2009-04-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "date": "2009-05-21T05:21:00",
        "db": "BID",
        "id": "34714"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "date": "2017-08-17T01:30:24.240000",
        "db": "NVD",
        "id": "CVE-2009-1557"
      },
      {
        "date": "2009-05-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control stack buffer overflow",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "xss",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ],
    "trust": 0.7
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…