- Jan 24, 2011
- 9,378
A popular wireless access point made by Cisco Systems' Linksys unit has a vulnerability that enables a remote attacker to gain root access and execute arbitrary commands on the device. The bug is several months old and Linksys has not issued a patch for it yet.
The vulnerability is in the Linksys WAP610N, a dual-band wireless access point that includes support for the 802.11n standard. The problem was identified by researchers at Secure Network, an Italian security company, which said in its advisory that it notified the vendor of the problem in June 2010. Cisco acknowledged the issue at the time, but hasn't issued a patch for the vulnerability as of yet.
The vulnerability itself allows an attacker to connect to a console on the access point without authenticating and then run system commands.
More details : link
The vulnerability is in the Linksys WAP610N, a dual-band wireless access point that includes support for the 802.11n standard. The problem was identified by researchers at Secure Network, an Italian security company, which said in its advisory that it notified the vendor of the problem in June 2010. Cisco acknowledged the issue at the time, but hasn't issued a patch for the vulnerability as of yet.
The vulnerability itself allows an attacker to connect to a console on the access point without authenticating and then run system commands.
More details : link