97 lines
2.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-2916",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-09-14T21:03:00.000",
"lastModified": "2008-09-05T20:52:59.187",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) upload new firmware using upgrade.cgi."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2930D914-EBA6-48D7-8D61-A7B0C3A140BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5A9F2EDC-30F5-480E-8E6E-4D0C553AE281"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:linksys:wrt54g:4.00.7:*:*:*:*:*:*:*",
"matchCriteriaId": "95D095E4-B0FC-4BFF-9E72-DFDE308A9062"
}
]
}
]
}
],
"references": [
{
"url": "http://www.idefense.com/application/poi/display?id=306&type=vulnerabilities",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.idefense.com/application/poi/display?id=307&type=vulnerabilities",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}