Vulnerability in Linksys WRT54g Router Firmware Allows Unauthorized Remote Access
CVE-2008-1247

Currently unrated

Key Information:

Vendor

Linksys

Status
Vendor
CVE Published:
10 March 2008

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC🟣 EPSS 13%

What is CVE-2008-1247?

The Linksys WRT54g router, specifically with firmware version 1.00.9, contains a security flaw in its web interface that allows remote attackers to execute arbitrary administrative commands without the need for authentication. This vulnerability is exploited via direct requests to various scripts in the firmware, such as Advanced.tri and Basic.tri. As a result, unauthorized users could potentially change settings, monitor traffic, or manipulate router configurations, posing significant risks to network security and integrity.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

13% chance of being exploited in the next 30 days.

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.