Gabriel Lima has reported a vulnerability in Linksys WRT54GC, which can be exploited by malicious people to bypass certain security restrictions.
The vulnerability is caused due to the router allowing unrestricted access to the administration.cgi web interface script. This can be exploited to change the administrator's password by sending a specially crafted HTTP request to the affected script.
The vulnerability is reported in firmware version 1.05.7. Other versions may also be affected.
Solution: Restrict internal network access to trusted users only.
Provided and/or discovered by: Gabriel Lima
Original Advisory: http://archives.neohapsis.com/archives/bugtraq/2009-04/0198.html
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org