← Back to CVEs
CVE-2008-1247
N/ADescription
The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote attackers to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) ctlog.tri, (5) ddns.tri, (6) dmz.tri, (7) factdefa.tri, (8) filter.tri, (9) fw.tri, (10) manage.tri, (11) ping.tri, (12) PortRange.tri, (13) ptrigger.tri, (14) qos.tri, (15) rstatus.tri, (16) tracert.tri, (17) vpn.tri, (18) WanMac.tri, (19) WBasic.tri, or (20) WFilter.tri. NOTE: the Security.tri vector is already covered by CVE-2006-5202.
CVE Details
CVSS v3.1 ScoreN/A
Published3/10/2008
Last Modified4/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
linksys:wrt54g
Weaknesses (CWE)
CWE-264
References
http://kinqpinz.info/lib/wrt54g/own.txt(cve@mitre.org)
http://secunia.com/advisories/29344(cve@mitre.org)
http://www.gnucitizen.org/projects/router-hacking-challenge/(cve@mitre.org)
http://www.securityfocus.com/archive/1/489009/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/28381(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41118(cve@mitre.org)
https://kinqpinz.info/lib/wrt54g/(cve@mitre.org)
https://kinqpinz.info/lib/wrt54g/own2.txt(cve@mitre.org)
https://www.exploit-db.com/exploits/5313(cve@mitre.org)
https://www.exploit-db.com/exploits/5926(cve@mitre.org)
http://kinqpinz.info/lib/wrt54g/own.txt(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29344(af854a3a-2127-422b-91ae-364da2661108)
http://www.gnucitizen.org/projects/router-hacking-challenge/(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/489009/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/28381(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41118(af854a3a-2127-422b-91ae-364da2661108)
https://kinqpinz.info/lib/wrt54g/(af854a3a-2127-422b-91ae-364da2661108)
https://kinqpinz.info/lib/wrt54g/own2.txt(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/5313(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/5926(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.