Rapid7 Vulnerability & Exploit Database

Linksys Accept HTTP Authentication Bypass

Back to Search

Linksys Accept HTTP Authentication Bypass

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
11/01/2004
Created
07/25/2018
Added
11/01/2004
Modified
12/04/2013

Description

It is possible to bypass HTTP authentication on the Linksys remote management interface. By sending "application/foo.xml" as part of the Accept header, access will be granted to the remote management interface.

This problem affects Linksys BEFSR41, BEFSR11 and BEFSRU31 with firmware versions from 1.41 through 1.43.2 and Linksys BEFW11S4 with firware versions from 1.42.7 through 1.43.2

Solution(s)

  • http-linksys-xml-auth-bypass

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;