CVE-2010-1573
moderate-risk
Published 2010-06-10
Linksys WAP54Gv3 firmware 3.04.03 and earlier uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote attackers to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi.
Do I need to act?
!
11.3% chance of exploitation in next 30 days
EPSS score — higher than 89% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (14)
Broken Link
http://secunia.com/advisories/40103
Exploit
http://www.icysilence.org/?p=268
Broken Link
http://www.securityfocus.com/bid/40648
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/59286
Broken Link
http://secunia.com/advisories/40103
Exploit
http://www.icysilence.org/?p=268
Broken Link
http://www.securityfocus.com/bid/40648
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/59286
48
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
11/34 · Low
Exposure
5/34 · Minimal