← Retour aux CVEs
CVE-2010-1573
CRITICAL9.8
Description
Linksys WAP54Gv3 firmware 3.04.03 and earlier uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote attackers to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie6/10/2010
Derniere modification4/11/2025
Sourcenvd
Observations honeypot0
Produits affectes
linksys:wap54glinksys:wap54g_firmware
Faiblesses (CWE)
CWE-798
References
http://secunia.com/advisories/40103(psirt@cisco.com)
http://tools.cisco.com/security/center/viewAlert.x?alertId=20682(psirt@cisco.com)
http://www.icysilence.org/?p=268(psirt@cisco.com)
http://www.securityfocus.com/archive/1/511733/100/0/threaded(psirt@cisco.com)
http://www.securityfocus.com/bid/40648(psirt@cisco.com)
http://www.vupen.com/english/advisories/2010/1419(psirt@cisco.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59286(psirt@cisco.com)
http://secunia.com/advisories/40103(af854a3a-2127-422b-91ae-364da2661108)
http://tools.cisco.com/security/center/viewAlert.x?alertId=20682(af854a3a-2127-422b-91ae-364da2661108)
http://www.icysilence.org/?p=268(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/511733/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/40648(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1419(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59286(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.