CVE-2006-2559
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/05/2006
Last modified:
03/04/2025
Description
Linksys WRT54G Wireless-G Broadband Router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:h:linksys:wrt54g:1.42.3:*:*:*:*:*:*:* | ||
| cpe:2.3:h:linksys:wrt54g:2.00.8:*:*:*:*:*:*:* | ||
| cpe:2.3:h:linksys:wrt54g:2.02.7:*:*:*:*:*:*:* | ||
| cpe:2.3:h:linksys:wrt54g:2.04.4:*:*:*:*:*:*:* | ||
| cpe:2.3:h:linksys:wrt54g:2.04.4_non_default:*:*:*:*:*:*:* | ||
| cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:* | ||
| cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:* | ||
| cpe:2.3:h:linksys:wrt54g:4.00.7:*:*:*:*:*:*:* | ||
| cpe:2.3:h:linksys:wrt54g_v5:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/20161
- http://securitytracker.com/id?1016134=
- http://www.securityview.org/dutch-student-finds-a-bug-in-upnp.html
- http://www.securityview.org/how-does-the-upnp-flaw-works.html
- http://www.vupen.com/english/advisories/2006/1909
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26707
- http://secunia.com/advisories/20161
- http://securitytracker.com/id?1016134=
- http://www.securityview.org/dutch-student-finds-a-bug-in-upnp.html
- http://www.securityview.org/how-does-the-upnp-flaw-works.html
- http://www.vupen.com/english/advisories/2006/1909
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26707



