Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2011-4499


The UPnP IGD implementation in the Broadcom UPnP stack on the Cisco Linksys WRT54G with firmware before 4.30.5, WRT54GS v1 through v3 with firmware before 4.71.1, and WRT54GS v4 with firmware before 1.06.1 allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an "external forwarding" vulnerability.


Published

2011-11-22T11:55:04.683

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-16

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco linksys_wrt54g_router_firmware ≤ 4.20.8 Yes
Application cisco linksys_wrt54g_router_firmware 3.03.9 Yes
Application cisco linksys_wrt54g_router_firmware 4.20.7 Yes
Hardware linksys wrt54g * Yes
Hardware linksys wrt54g 2.2 Yes
Application cisco linksys_wrt54gs_router_firmware ≤ 4.70.6 Yes
Application cisco linksys_wrt54gs_router_firmware 2.09.1 Yes
Hardware linksys wrt54gs 1.0 Yes
Hardware linksys wrt54gs 2.0 Yes
Hardware linksys wrt54gs 3.0 Yes
Application cisco linksys_wrt54gs_router_firmware ≤ 1.06 Yes
Hardware linksys wrt54gs 4.0 Yes

References