Cisco.Linksys.WAG54GS.ADSL.Router.Change.Admin.Password
Description
This indicates an attack attempt to exploit a Cross Site Request Forgery vulnerability in Cisco Linksys WAG54GS ADSL Router.
A vulnerability has been reported in Linksys that may allow an attacker to send a POST request to remote vulnerable system to change ADSL Router admin password. This is due to the user input filters failing to properly sanitize the request source. An attacker may include a new admin password by supplying a specially crafted web page, then send a POST request to the ADSL Router's web interface management.
Affected Products
Cisco Linksys WAG54GS (ADSL Router)
Impact
Information Spoofing: Remote attackers can spoof datas of vulnerable systems.
Recommended Actions
Currently we are not aware of any vendor supplied patch for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |