Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Router/Bridge/Hub)  >   Linksys Router Vendors:   Cisco
Linksys WRT54GS UPnP Bug Lets Remote Internal Users Cause Packets to Be Forwarded to External Systems
SecurityTracker Alert ID:  1016134
SecurityTracker URL:
CVE Reference:   CVE-2006-2559   (Links to External Site)
Updated:  Aug 28 2009
Original Entry Date:  May 22 2006
Impact:   Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): WRT54GS; prior to firmware version 4.71.1
Description:   A vulnerability was reported in the Linksys WRT54GS wireless router. A remote user on the internal network can cause the router to forward packets to an external host.

A remote user on the internal interface (i.e., LAN side) can set the UPnP InternalClient parameter to point to a host on the external network. The router will then perform network address translation on incoming packets and forward the packets to the specified external host.

The vulnerability was discovered by Armijn Hemel and disclosed at the System Administration and Network Engineering (SANE) Conference. Some limited information is available at:

Impact:   A remote user on the internal network can cause the router to forward incoming packets to an external host.
Solution:   The vendor has issued a fixed firmware version (4.71.1).

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC