HTTP: Cisco Linksys WRT54GL Command Injection

This signature detects attempts to exploit a known command injection vulnerability in Cisco Linksys WRT54GL. It is due to improper input filtering. In a successful code injection attack, the behavior of the target host is entirely dependent on the intended function of the injected code and executes within the security context of the process.

Extended Description

Buffer overflow in apply.cgi in Linksys WRT54G 3.01.03, 3.03.6, and possibly other versions before 4.20.7, allows remote attackers to execute arbitrary code via a long HTTP POST request.

Affected Products

Linksys wrt54g

References

BugTraq: 57459

CVE: CVE-2005-2799

Short Name
HTTP:CISCO:LINKSYS-CMD-INJ
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2005-2799 Cisco Command Injection Linksys WRT54GL bid:57459
Release Date
01/24/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3411
False Positive
Unknown
Vendors

Linksys

Found a potential security threat?