Linksys BEF Router prior 1.50 Authentication Gozila.cgi denial of service
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.8 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Linksys BEF Router. It has been classified as critical. This impacts an unknown function of the file Gozila.cgi of the component Authentication. This manipulation causes denial of service. The attack can be initiated remotely. Additionally, an exploit exists. Upgrading the affected component is recommended.
Details
A vulnerability was found in Linksys BEF Router (Router Operating System). It has been declared as critical. Affected by this vulnerability is an unknown code block of the file Gozila.cgi of the component Authentication. The manipulation with an unknown input leads to a denial of service vulnerability. The CWE definition for the vulnerability is CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. As an impact it is known to affect availability.
The bug was discovered 11/10/2003. The weakness was released 06/05/2004 by b0f as not defined posting (Bugtraq). It is possible to read the advisory at securityfocus.com. The attack can be launched remotely. Technical details and also a public exploit are known. The attack technique deployed by this issue is T1499 according to MITRE ATT&CK.
After before and not just, there has been an exploit disclosed. It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 208 days. During that time the estimated underground price was around $0-$5k.
Upgrading to version 1.50 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at linksys.com. The best possible mitigation is suggested to be upgrading to the latest version. Attack attempts may be identified with Snort ID 2225.
The vulnerability is also documented in the databases at X-Force (16305), SecurityFocus (BID 10453†), OSVDB (6655†) and Secunia (SA11764†). Additional details are provided at securiteam.com. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.linksys.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.8
VulDB Base Score: 5.3
VulDB Temp Score: 4.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: BEF Router 1.50
Patch: linksys.com
Snort ID: 2225
Timeline
11/10/2003 🔍06/03/2004 🔍
06/03/2004 🔍
06/05/2004 🔍
06/05/2004 🔍
06/08/2004 🔍
06/28/2019 🔍
Sources
Vendor: linksys.comAdvisory: securityfocus.com⛔
Researcher: b0f
Status: Not defined
GCVE (VulDB): GCVE-100-691
X-Force: 16305 - Linksys DomainName buffer overflow, Medium Risk
SecurityFocus: 10453 - Multiple Linksys Routers Gozila.CGI Denial Of Service Vulnerabilities
Secunia: 11764 - Linksys BEF Series Routers Denial of Service Vulnerabilities, Moderately Critical
OSVDB: 6655 - Linksys BEF Series Routers Gozila.cgi Multiple Parameter Remote DoS
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
Entry
Created: 06/08/2004 11:32Updated: 06/28/2019 16:20
Changes: 06/08/2004 11:32 (69), 06/28/2019 16:20 (3)
Complete: 🔍
Cache ID: 216:9DA:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.