Linksys By Cisco WAG54G2 Wireless-G ADSL2+ Gateway firmware versions 1. 00. 10 to 1. 00. 15 contain a vulnerability that could allow an authenticated, remote attacker to inject shell commands via the Web Management Console. The vulnerability is due to insufficient sanitation of user supplied input from the Web Management Console.
- How do I upgrade the firmware on the WAG54G2? The WAG54G2 is the Linksys Wireless-G ADSL2+ Gateway with 1 DSL port and 4 10/100 Mb Ethernet.
- Description. Linksys By Cisco WAG54G2 Wireless-G ADSL2+ Gateway firmware versions 1.00.10 to 1.00.15 contain a vulnerability that could.
- Wireless - Wireless MAC Filter, Wireless - Advanced Wireless, Security - Firewall. Security - VPN Passthrough, Access Restrictions - Internet Access Policy.
- Router Screenshots for the Linksys WAG54G2. Firmware Upgrade Firmware Version:V1.00.10 Administration Wireless ADSL2+ Gateway WAG54G2 Setup.
Как обновить прошивку Linksys. Cisco, производитель роутеров Linksys, обеспечивает периодическое обновление прошивки всех продуктов в.
An attacker could exploit the vulnerability to perform actions with root privileges that could completely compromise the affected device. Proof-of-concept code is publicly available. Linksys has confirmed the vulnerability; however, complete software updates are not available.
An authenticated, remote attacker could exploit this vulnerability to gain elevated privileges and perform shell commands as the root user. compromising the affected device. Linksys by Cisco WAG54G2 Wireless-G ADSL2+ Gateway running firmware versions 1. 00. 10 to 1.
00. 15 are vulnerable. To exploit this vulnerability, the attacker must have access to the device and be able to log on to the Web Management Console. No further authentication is required. The vulnerability is due to insufficient sanitation of user-supplied input via the Web Management Console. An authenticated, remote attacker could exploit the vulnerability to execute arbitrary shell commands on the underlying OS as root through crafted HTTP requests.
This action could lead to a complete compromise of the device. Linksys has released a change log at the following link: 1. 00. 16. Multiple factors could mitigate exploits of this vulnerability. First, an attacker must have access to the Web Administration Console via the WAN port of the device. An exploit can be performed if this feature has been enabled and the attacker can successfully authenticate.
However, because the affected device is typically deployed in a Small Office/Home Office (SOHO) environment, the requirement for enabling management via the WAN port is unlikely. The feature is disabled by default. Discounting the previous factor, an attacker can exploit this vulnerability remotely by convincing a user to visit a malicious web page while he or she is authenticated to the affected device.
An attacker can exploit this vulnerability remotely without pre-authentication by knowing the authentication credentials of the device. This scenario may present itself if the default authentication credentials of the device have not been changed. It is strongly recommended that administrators always change default authentication credentials. It should also be noted that there is not much privilege separation between the Administrator and the root user. If an attacker is able to gain Administrator privileges to the device, compromising actions can be made against the device. An attacker does not necessarily need root access to exploit the device. Cisco indicates the software updates did not completely correct the vulnerability.
Additional updates are forthcoming. Administrators are advised to put into place other effective mitigations until complete fixes are available. Administrators are advised to change the default password for new devices during the initial setup.
Administrators are advised to select strong passwords for the administrative interface. Patches and software updates are not available. The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances.
THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK.
INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.