Cross-Site Scripting Vulnerabilities in Cisco Linksys Wireless-G ADSL Gateway
CVE-2007-3574

Currently unrated

Key Information:

Vendor

Linksys

Status
Vendor
CVE Published:
5 July 2007

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2007-3574?

The Cisco Linksys WAG54GS Wireless-G ADSL Gateway with firmware version 1.00.06 is susceptible to multiple cross-site scripting (XSS) vulnerabilities via the setup.cgi interface. This allows remote attackers to inject arbitrary web scripts or HTML into the gateway through specific parameters such as c4_trap_ip_, devname, snmp_getcomm, or snmp_setcomm. Exploitation of these vulnerabilities could lead to unauthorized access or alteration of data by executing harmful scripts in the context of the user’s browser.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

8% chance of being exploited in the next 30 days.

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.