Cisco.Linksys.WAG54GS.ADSL.Router.Change.Admin.Password

description-logoDescription

This indicates an attack attempt to exploit a Cross Site Request Forgery vulnerability in Cisco Linksys WAG54GS ADSL Router.
A vulnerability has been reported in Linksys that may allow an attacker to send a POST request to remote vulnerable system to change ADSL Router admin password. This is due to the user input filters failing to properly sanitize the request source. An attacker may include a new admin password by supplying a specially crafted web page, then send a POST request to the ADSL Router's web interface management.

affected-products-logoAffected Products

Cisco Linksys WAG54GS (ADSL Router)

Impact logoImpact

Information Spoofing: Remote attackers can spoof datas of vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are not aware of any vendor supplied patch for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)