[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] WRT54G directory trasversial vulnerability



On Wed, 2005-10-12 at 16:36 -0400, Shell wrote:
> I just found a vulnerability in Linksys WRT54G routers.
> 
> http://192.168.1.1/apply.cgi?action=../
> 
> It loads the page after action
> 
> http://192.168.1.1/apply.cgi?action=../ returns the setup page
> http://192.168.1.1/apply.cgi?action=../blah returns that the file does not 
> exist


Confirmed, however authentication is required. Still a vulnerability in
the system and worth patching though.

It's worth noting that there is alternative firmware available for this
device such as OpenWRT http://www.openwrt.org .

-- 
With Regards..
Barrie Dempster (zeedo) - Fortiter et Strenue

"He who hingeth aboot, geteth hee-haw" Victor - Still Game

blog:  http://reboot-robot.net
sites: http://www.bsrf.org.uk - http://www.security-forums.com
ca:    https://www.cacert.org/index.php?id=3

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/