Linksys Router Authentication Bypass Backdoor Vulnerability
Last Update Date:
6 Jan 2014 12:33
Release Date:
6 Jan 2014
4834
Views
RISK: High Risk
TYPE: Operating Systems - Embedded OS

A vulnerability has been identified in several Linksys Routers, which can be exploited by remote user can gain administrative access.
A remote user can send specially crafted data to TCP port 32764 to execute commands on the target system with administrative privileges.
Note: Vulnerability has no patch available.
Impact
- Security Restriction Bypass
System / Technologies affected
- Linksys WAG200G
- Linksys WAG320N
- Linksys WAG54G2
- Linksys WAG120N
- Linksys WAP4410N
- Other Linksys models may be affected
Solutions
- Note: Vulnerability has no patch available.
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with