var-201006-0258
Vulnerability from variot
Linksys WAP54Gv3 firmware 3.04.03 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) data2 and (2) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi. WAP54Gv3 is prone to a remote security vulnerability. Linksys WAP54Gv3 firmware has multiple arbitrary command execution vulnerabilities. These parameters include: data2 parameter and data3 parameter of Debug_command_page.asp and debug.cgi
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201006-0258", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wap54gv3", "scope": "eq", "trust": 1.9, "vendor": "linksys", "version": "3.05.03" }, { "model": "wap54gv3", "scope": "lte", "trust": 1.0, "vendor": "linksys", "version": "3.04.03" }, { "model": "wap54gv3", "scope": "eq", "trust": 0.9, "vendor": "linksys", "version": "3.04.03" }, { "model": "wap54gv3", "scope": "lte", "trust": 0.8, "vendor": "cisco linksys", "version": "3.04.03" } ], "sources": [ { "db": "BID", "id": "78915" }, { "db": "JVNDB", "id": "JVNDB-2010-004868" }, { "db": "NVD", "id": "CVE-2010-2261" }, { "db": "CNNVD", "id": "CNNVD-201006-127" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:linksys:wap54gv3:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.04.03", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:linksys:wap54gv3:3.05.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-2261" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "78915" } ], "trust": 0.3 }, "cve": "CVE-2010-2261", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2010-2261", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-44866", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2010-2261", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201006-127", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-44866", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-44866" }, { "db": "JVNDB", "id": "JVNDB-2010-004868" }, { "db": "NVD", "id": "CVE-2010-2261" }, { "db": "CNNVD", "id": "CNNVD-201006-127" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linksys WAP54Gv3 firmware 3.04.03 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) data2 and (2) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi. WAP54Gv3 is prone to a remote security vulnerability. Linksys WAP54Gv3 firmware has multiple arbitrary command execution vulnerabilities. These parameters include: data2 parameter and data3 parameter of Debug_command_page.asp and debug.cgi", "sources": [ { "db": "NVD", "id": "CVE-2010-2261" }, { "db": "JVNDB", "id": "JVNDB-2010-004868" }, { "db": "BID", "id": "78915" }, { "db": "VULHUB", "id": "VHN-44866" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-2261", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2010-004868", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201006-127", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20100608 IS-2010-002 - LINKSYS WAP54GV3 REMOTE DEBUG ROOT SHELL", "trust": 0.6 }, { "db": "BID", "id": "78915", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-44866", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-44866" }, { "db": "BID", "id": "78915" }, { "db": "JVNDB", "id": "JVNDB-2010-004868" }, { "db": "NVD", "id": "CVE-2010-2261" }, { "db": "CNNVD", "id": "CNNVD-201006-127" } ] }, "id": "VAR-201006-0258", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-44866" } ], "trust": 0.6625 }, "last_update_date": "2023-12-18T12:58:31.685000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Linksys", "trust": 0.8, "url": "http://home.cisco.com/en-apac/home" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-004868" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-44866" }, { "db": "JVNDB", "id": "JVNDB-2010-004868" }, { "db": "NVD", "id": "CVE-2010-2261" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/511733/100/0/threaded" }, { "trust": 0.9, "url": "http://www.securityfocus.com/archive/1/archive/1/511733/100/0/threaded" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2261" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2261" } ], "sources": [ { "db": "VULHUB", "id": "VHN-44866" }, { "db": "BID", "id": "78915" }, { "db": "JVNDB", "id": "JVNDB-2010-004868" }, { "db": "NVD", "id": "CVE-2010-2261" }, { "db": "CNNVD", "id": "CNNVD-201006-127" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-44866" }, { "db": "BID", "id": "78915" }, { "db": "JVNDB", "id": "JVNDB-2010-004868" }, { "db": "NVD", "id": "CVE-2010-2261" }, { "db": "CNNVD", "id": "CNNVD-201006-127" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-06-10T00:00:00", "db": "VULHUB", "id": "VHN-44866" }, { "date": "2010-06-09T00:00:00", "db": "BID", "id": "78915" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-004868" }, { "date": "2010-06-10T00:30:11.833000", "db": "NVD", "id": "CVE-2010-2261" }, { "date": "2010-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201006-127" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-10T00:00:00", "db": "VULHUB", "id": "VHN-44866" }, { "date": "2010-06-09T00:00:00", "db": "BID", "id": "78915" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-004868" }, { "date": "2018-10-10T19:59:28.180000", "db": "NVD", "id": "CVE-2010-2261" }, { "date": "2010-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201006-127" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201006-127" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linksys WAP54Gv3 Vulnerable to arbitrary command execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-004868" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201006-127" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.