Search criteria

15 vulnerabilities found for wvc54gca by cisco

VAR-200905-0187

Vulnerability from variot - Updated: 2025-04-10 22:31

The Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 sends configuration data in response to a Setup Wizard remote-management command, which allows remote attackers to obtain sensitive information such as passwords by reading the SetupWizard.exe process memory, a related issue to CVE-2008-4390. The Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control contains a stack buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. The problem is CVE-2008-4390 May be related toBy a third party SetupWizard.exe By reading the process memory, you may get important information such as passwords. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera is prone to an information-disclosure vulnerability. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. After a wireless camera is discovered by a client using the Linksys WVC54GCA, SetupWizard.exe sends a UDP request to the device as part of the handshake, and the device responds to the request with clear-text login credentials. An attacker could find the returned login credentials from the SetupWizard.exe process and gain unauthorized administrative access. ----------------------------------------------------------------------

Secunia is pleased to announce the release of the annual Secunia report for 2008.

Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics

Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/

Stay Secure,

Secunia


TITLE: Linksys WVC54GCA Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA34767

VERIFY ADVISORY: http://secunia.com/advisories/34767/

DESCRIPTION: pagvac has reported some vulnerabilities in Linksys WVC54GCA, which can be exploited by malicious people to disclose sensitive information or conduct cross-site scripting attacks, and by malicious users to bypass certain security restrictions.

1) The device sends e.g. login credentials in plain text after receiving a specially crafted UDP packet.

This is related to vulnerability #1 in: SA33032

2) Input passed to the "next_file" parameter in img/main.cgi is not properly verified before being used to read files. This can be exploited to read the .htpasswd file from the current directory and disclose the administrator's password.

Successful exploitation of this vulnerability requires valid user credentials.

3) Input passed to the "next_file" parameter in img/main.cgi, main.cgi, and adm/file.cgi is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerabilities are reported in firmware versions 1.00R22 and 1.00R24. Other versions may also be affected.

SOLUTION: Use the product in trusted networks only.

Filter malicious characters and character sequences in a web proxy.

PROVIDED AND/OR DISCOVERED BY: pagvac

ORIGINAL ADVISORY: http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/ http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/ http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/

OTHER REFERENCES: SA33032: http://secunia.com/advisories/33032/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


.

1) A security issue is caused due to the device sending certain information (e.g. This can be exploited to gain access to sensitive information by sending a specially crafted packet to a vulnerable device.

2) A vulnerability is caused due to a boundary error in the "SetSource()" method of the NetCamPlayerWeb11gv2 ActiveX control (NetCamPlayerWeb11gv2.ocx). This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into visiting a malicious website.

SOLUTION: Update to version 1.25.

PROVIDED AND/OR DISCOVERED BY: US-CERT credits Greg Linares, eEye

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200905-0187",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "linksys a division of cisco",
        "version": null
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.00r24"
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.00r22"
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "1.00r22 and  1.00r24"
      },
      {
        "model": "wvc54gca 1.00r24",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "wvc54gca 1.00r22",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "BID",
        "id": "34596"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003389"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-069"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1555"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:cisco:wvc54gca",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003389"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "pagvac",
    "sources": [
      {
        "db": "BID",
        "id": "34596"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-069"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2009-1555",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2009-1555",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-39001",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-1555",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#639345",
            "trust": 0.8,
            "value": "2.73"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#528993",
            "trust": 0.8,
            "value": "1.59"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-1555",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200905-069",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-39001",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39001"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003389"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-069"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1555"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 sends configuration data in response to a Setup Wizard remote-management command, which allows remote attackers to obtain sensitive information such as passwords by reading the SetupWizard.exe process memory, a related issue to CVE-2008-4390. The Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control contains a stack buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. The problem is CVE-2008-4390 May be related toBy a third party SetupWizard.exe By reading the process memory, you may get important information such as passwords. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera is prone to an information-disclosure vulnerability. \nLinksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. After a wireless camera is discovered by a client using the Linksys WVC54GCA, SetupWizard.exe sends a UDP request to the device as part of the handshake, and the device responds to the request with clear-text login credentials. An attacker could find the returned login credentials from the SetupWizard.exe process and gain unauthorized administrative access. ----------------------------------------------------------------------\n\nSecunia is pleased to announce the release of the annual Secunia\nreport for 2008. \n\nHighlights from the 2008 report:\n * Vulnerability Research\n * Software Inspection Results\n * Secunia Research Highlights\n * Secunia Advisory Statistics\n\nRequest the full 2008 Report here:\nhttp://secunia.com/advisories/try_vi/request_2008_report/\n\nStay Secure,\n\nSecunia\n\n\n----------------------------------------------------------------------\n\nTITLE:\nLinksys WVC54GCA Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA34767\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/34767/\n\nDESCRIPTION:\npagvac has reported some vulnerabilities in Linksys WVC54GCA, which\ncan be exploited by malicious people to disclose sensitive\ninformation or conduct cross-site scripting attacks, and by malicious\nusers to bypass certain security restrictions. \n\n1) The device sends e.g. login credentials in plain text after\nreceiving a specially crafted UDP packet. \n\nThis is related to vulnerability #1 in:\nSA33032\n\n2) Input passed to the \"next_file\" parameter in img/main.cgi is not\nproperly verified before being used to read files. This can be\nexploited to read the .htpasswd file from the current directory and\ndisclose the administrator\u0027s password. \n\nSuccessful exploitation of this vulnerability requires valid user\ncredentials. \n\n3) Input passed to the \"next_file\" parameter in img/main.cgi,\nmain.cgi, and adm/file.cgi is not properly sanitised before being\nreturned to the user. This can be exploited to execute arbitrary HTML\nand script code in a user\u0027s browser session in context of an affected\nsite. \n\nThe vulnerabilities are reported in firmware versions 1.00R22 and\n1.00R24. Other versions may also be affected. \n\nSOLUTION:\nUse the product in trusted networks only. \n\nFilter malicious characters and character sequences in a web proxy. \n\nPROVIDED AND/OR DISCOVERED BY:\npagvac\n\nORIGINAL ADVISORY:\nhttp://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/\nhttp://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/\nhttp://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/\n\nOTHER REFERENCES:\nSA33032:\nhttp://secunia.com/advisories/33032/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\n1) A security issue is caused due to the device sending certain\ninformation (e.g. This can be exploited to\ngain access to sensitive information by sending a specially crafted\npacket to a vulnerable device. \n\n2) A vulnerability is caused due to a boundary error in the\n\"SetSource()\" method of the NetCamPlayerWeb11gv2 ActiveX control\n(NetCamPlayerWeb11gv2.ocx). This can be exploited to cause a\nstack-based buffer overflow by e.g. tricking a user into visiting a\nmalicious website. \n\nSOLUTION:\nUpdate to version 1.25. \n\nPROVIDED AND/OR DISCOVERED BY:\nUS-CERT credits Greg Linares, eEye",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-1555"
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003389"
      },
      {
        "db": "BID",
        "id": "34596"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39001"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      }
    ],
    "trust": 3.6
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-1555",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "34596",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "34767",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1173",
        "trust": 1.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003389",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-069",
        "trust": 0.6
      },
      {
        "db": "SECUNIA",
        "id": "33032",
        "trust": 0.2
      },
      {
        "db": "OTHER",
        "id": "NONE",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-39001",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "76983",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "72709",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39001"
      },
      {
        "db": "BID",
        "id": "34596"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003389"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-069"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1555"
      }
    ]
  },
  "id": "VAR-200905-0187",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-39001"
      }
    ],
    "trust": 0.02
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "camera device"
        ],
        "sub_category": "video camera",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      }
    ]
  },
  "last_update_date": "2025-04-10T22:31:45.691000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003389"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39001"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003389"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1555"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/34596"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/34767"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2009/1173"
      },
      {
        "trust": 1.6,
        "url": "about vulnerability notes"
      },
      {
        "trust": 1.6,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 1.6,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1555"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1555"
      },
      {
        "trust": 0.3,
        "url": "http://www.linksysbycisco.com/us/en/products/wvc54gca"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/33032/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "https://ieeexplore.ieee.org/abstract/document/10769424"
      },
      {
        "trust": 0.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/34767/"
      },
      {
        "trust": 0.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/try_vi/request_2008_report/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/528993"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/639345"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/20682/"
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39001"
      },
      {
        "db": "BID",
        "id": "34596"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003389"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-069"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1555"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39001"
      },
      {
        "db": "BID",
        "id": "34596"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003389"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-069"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1555"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "date": "2009-05-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39001"
      },
      {
        "date": "2009-04-20T00:00:00",
        "db": "BID",
        "id": "34596"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003389"
      },
      {
        "date": "2009-04-27T15:17:22",
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "date": "2008-12-08T17:18:51",
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "date": "2009-04-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-069"
      },
      {
        "date": "2009-05-06T16:30:00.577000",
        "db": "NVD",
        "id": "CVE-2009-1555"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "date": "2009-05-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39001"
      },
      {
        "date": "2009-05-21T05:21:00",
        "db": "BID",
        "id": "34596"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003389"
      },
      {
        "date": "2009-05-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-069"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2009-1555"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-069"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control stack buffer overflow",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-069"
      }
    ],
    "trust": 0.6
  }
}

VAR-200905-0189

Vulnerability from variot - Updated: 2025-04-10 22:08

Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allow remote attackers to inject arbitrary web script or HTML via the next_file parameter to (1) main.cgi, (2) img/main.cgi, or (3) adm/file.cgi; or (4) the this_file parameter to adm/file.cgi. The Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control contains a stack buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. (1) main.cgi To next_file Parameters (2) img/main.cgi To next_file Parameters (3) adm/file.cgi To next_file Parameters (4) adm/file.cgi To this_file Parameters. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. Linksys WVC54GCA is a wireless network camera. Remote attackers can send The camera's console submits a malicious request to perform a cross-site scripting attack. ----------------------------------------------------------------------

Secunia is pleased to announce the release of the annual Secunia report for 2008.

Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics

Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/

Stay Secure,

Secunia


TITLE: Linksys WVC54GCA Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA34767

VERIFY ADVISORY: http://secunia.com/advisories/34767/

DESCRIPTION: pagvac has reported some vulnerabilities in Linksys WVC54GCA, which can be exploited by malicious people to disclose sensitive information or conduct cross-site scripting attacks, and by malicious users to bypass certain security restrictions.

1) The device sends e.g. login credentials in plain text after receiving a specially crafted UDP packet.

This is related to vulnerability #1 in: SA33032

2) Input passed to the "next_file" parameter in img/main.cgi is not properly verified before being used to read files. This can be exploited to read the .htpasswd file from the current directory and disclose the administrator's password.

Successful exploitation of this vulnerability requires valid user credentials.

3) Input passed to the "next_file" parameter in img/main.cgi, main.cgi, and adm/file.cgi is not properly sanitised before being returned to the user.

The vulnerabilities are reported in firmware versions 1.00R22 and 1.00R24. Other versions may also be affected.

SOLUTION: Use the product in trusted networks only.

Filter malicious characters and character sequences in a web proxy.

PROVIDED AND/OR DISCOVERED BY: pagvac

ORIGINAL ADVISORY: http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/ http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/ http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/

OTHER REFERENCES: SA33032: http://secunia.com/advisories/33032/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


.

1) A security issue is caused due to the device sending certain information (e.g. This can be exploited to gain access to sensitive information by sending a specially crafted packet to a vulnerable device.

2) A vulnerability is caused due to a boundary error in the "SetSource()" method of the NetCamPlayerWeb11gv2 ActiveX control (NetCamPlayerWeb11gv2.ocx). This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into visiting a malicious website.

SOLUTION: Update to version 1.25.

PROVIDED AND/OR DISCOVERED BY: US-CERT credits Greg Linares, eEye

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200905-0189",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "linksys a division of cisco",
        "version": null
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.00r24"
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.00r22"
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "1.00r22 and  1.00r24"
      },
      {
        "model": "wvc54gca 1.00r24",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "wvc54gca 1.00r22",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "BID",
        "id": "34714"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:cisco:wvc54gca",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "pagvac",
    "sources": [
      {
        "db": "BID",
        "id": "34714"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2009-1557",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2009-1557",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-39003",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-1557",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#639345",
            "trust": 0.8,
            "value": "2.73"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#528993",
            "trust": 0.8,
            "value": "1.59"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-1557",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200905-071",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-39003",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allow remote attackers to inject arbitrary web script or HTML via the next_file parameter to (1) main.cgi, (2) img/main.cgi, or (3) adm/file.cgi; or (4) the this_file parameter to adm/file.cgi. The Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control contains a stack buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. (1) main.cgi To next_file Parameters (2) img/main.cgi To next_file Parameters (3) adm/file.cgi To next_file Parameters (4) adm/file.cgi To this_file Parameters. \nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. \nLinksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. Linksys WVC54GCA is a wireless network camera. Remote attackers can send The camera\u0027s console submits a malicious request to perform a cross-site scripting attack. ----------------------------------------------------------------------\n\nSecunia is pleased to announce the release of the annual Secunia\nreport for 2008. \n\nHighlights from the 2008 report:\n * Vulnerability Research\n * Software Inspection Results\n * Secunia Research Highlights\n * Secunia Advisory Statistics\n\nRequest the full 2008 Report here:\nhttp://secunia.com/advisories/try_vi/request_2008_report/\n\nStay Secure,\n\nSecunia\n\n\n----------------------------------------------------------------------\n\nTITLE:\nLinksys WVC54GCA Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA34767\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/34767/\n\nDESCRIPTION:\npagvac has reported some vulnerabilities in Linksys WVC54GCA, which\ncan be exploited by malicious people to disclose sensitive\ninformation or conduct cross-site scripting attacks, and by malicious\nusers to bypass certain security restrictions. \n\n1) The device sends e.g. login credentials in plain text after\nreceiving a specially crafted UDP packet. \n\nThis is related to vulnerability #1 in:\nSA33032\n\n2) Input passed to the \"next_file\" parameter in img/main.cgi is not\nproperly verified before being used to read files. This can be\nexploited to read the .htpasswd file from the current directory and\ndisclose the administrator\u0027s password. \n\nSuccessful exploitation of this vulnerability requires valid user\ncredentials. \n\n3) Input passed to the \"next_file\" parameter in img/main.cgi,\nmain.cgi, and adm/file.cgi is not properly sanitised before being\nreturned to the user. \n\nThe vulnerabilities are reported in firmware versions 1.00R22 and\n1.00R24. Other versions may also be affected. \n\nSOLUTION:\nUse the product in trusted networks only. \n\nFilter malicious characters and character sequences in a web proxy. \n\nPROVIDED AND/OR DISCOVERED BY:\npagvac\n\nORIGINAL ADVISORY:\nhttp://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/\nhttp://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/\nhttp://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/\n\nOTHER REFERENCES:\nSA33032:\nhttp://secunia.com/advisories/33032/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\n1) A security issue is caused due to the device sending certain\ninformation (e.g. This can be exploited to\ngain access to sensitive information by sending a specially crafted\npacket to a vulnerable device. \n\n2) A vulnerability is caused due to a boundary error in the\n\"SetSource()\" method of the NetCamPlayerWeb11gv2 ActiveX control\n(NetCamPlayerWeb11gv2.ocx). This can be exploited to cause a\nstack-based buffer overflow by e.g. tricking a user into visiting a\nmalicious website. \n\nSOLUTION:\nUpdate to version 1.25. \n\nPROVIDED AND/OR DISCOVERED BY:\nUS-CERT credits Greg Linares, eEye",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "BID",
        "id": "34714"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      }
    ],
    "trust": 3.6
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-39003",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-1557",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "34714",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "34767",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1173",
        "trust": 1.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "50224",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "54",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071",
        "trust": 0.6
      },
      {
        "db": "SECUNIA",
        "id": "33032",
        "trust": 0.2
      },
      {
        "db": "OTHER",
        "id": "NONE",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "32955",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-86216",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "76983",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "72709",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "db": "BID",
        "id": "34714"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      }
    ]
  },
  "id": "VAR-200905-0189",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      }
    ],
    "trust": 0.02
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "camera device"
        ],
        "sub_category": "camera",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      }
    ]
  },
  "last_update_date": "2025-04-10T22:08:03.407000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/34714"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/34767"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2009/1173"
      },
      {
        "trust": 1.6,
        "url": "about vulnerability notes"
      },
      {
        "trust": 1.6,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 1.6,
        "url": "provide a vendor statement"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50224"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1557"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1557"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/50224"
      },
      {
        "trust": 0.3,
        "url": "http://www.linksysbycisco.com/us/en/products/wvc54gca"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/33032/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "https://ieeexplore.ieee.org/abstract/document/10769424"
      },
      {
        "trust": 0.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/"
      },
      {
        "trust": 0.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/34767/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/try_vi/request_2008_report/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/528993"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/639345"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/20682/"
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "db": "BID",
        "id": "34714"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "db": "BID",
        "id": "34714"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1557"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "date": "2009-05-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "date": "2009-04-25T00:00:00",
        "db": "BID",
        "id": "34714"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "date": "2009-04-27T15:17:22",
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "date": "2008-12-08T17:18:51",
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "date": "2009-04-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      },
      {
        "date": "2009-05-06T16:30:00.610000",
        "db": "NVD",
        "id": "CVE-2009-1557"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39003"
      },
      {
        "date": "2009-05-21T05:21:00",
        "db": "BID",
        "id": "34714"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003391"
      },
      {
        "date": "2009-05-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2009-1557"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control stack buffer overflow",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "xss",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-071"
      }
    ],
    "trust": 0.7
  }
}

VAR-200905-0188

Vulnerability from variot - Updated: 2025-04-10 21:39

img/main.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote authenticated users to read arbitrary files in img/ via a filename in the next_file parameter, as demonstrated by reading .htpasswd to obtain the admin password, a different vulnerability than CVE-2004-2507. The Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control contains a stack buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. The Linksys WVC54GC wireless video camera insecurely sends initial configuration information over the network, which can allow a remote, unauthenticated attacker to intercept video streams, access wireless network authentication credentials, modify the device firmware, or cause a denial-of-service to the video camera. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera is prone to an information-disclosure vulnerability. Exploiting this issue can allow a remote attacker to harvest sensitive information such as the administrator's password, which can lead to a complete compromise of the device. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. The Linksys WVC54GCA management console does not properly filter the next_file parameter submitted by the main.cgi program, and remote attackers can retrieve the contents of the current directory by submitting malicious requests. If the contents of .htpasswd are retrieved, the user can perform arbitrary operations by logging into the console without authorization. ----------------------------------------------------------------------

Secunia is pleased to announce the release of the annual Secunia report for 2008.

Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics

Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/

Stay Secure,

Secunia


TITLE: Linksys WVC54GCA Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA34767

VERIFY ADVISORY: http://secunia.com/advisories/34767/

DESCRIPTION: pagvac has reported some vulnerabilities in Linksys WVC54GCA, which can be exploited by malicious people to disclose sensitive information or conduct cross-site scripting attacks, and by malicious users to bypass certain security restrictions.

1) The device sends e.g. login credentials in plain text after receiving a specially crafted UDP packet. This can be exploited to read the .htpasswd file from the current directory and disclose the administrator's password.

Successful exploitation of this vulnerability requires valid user credentials.

3) Input passed to the "next_file" parameter in img/main.cgi, main.cgi, and adm/file.cgi is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerabilities are reported in firmware versions 1.00R22 and 1.00R24. Other versions may also be affected.

SOLUTION: Use the product in trusted networks only.

Filter malicious characters and character sequences in a web proxy.

PROVIDED AND/OR DISCOVERED BY: pagvac

ORIGINAL ADVISORY: http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/ http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/ http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/

OTHER REFERENCES: SA33032: http://secunia.com/advisories/33032/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


.

1) A security issue is caused due to the device sending certain information (e.g. This can be exploited to gain access to sensitive information by sending a specially crafted packet to a vulnerable device.

2) A vulnerability is caused due to a boundary error in the "SetSource()" method of the NetCamPlayerWeb11gv2 ActiveX control (NetCamPlayerWeb11gv2.ocx). This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into visiting a malicious website.

SOLUTION: Update to version 1.25.

PROVIDED AND/OR DISCOVERED BY: US-CERT credits Greg Linares, eEye

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200905-0188",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "linksys a division of cisco",
        "version": null
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.00r24"
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.00r22"
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "1.00r22 and  1.00r24"
      },
      {
        "model": "wvc54gca 1.00r24",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "wvc54gca 1.00r22",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "BID",
        "id": "34629"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003390"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-070"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1556"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:cisco:wvc54gca",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003390"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "pagvac",
    "sources": [
      {
        "db": "BID",
        "id": "34629"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-070"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2009-1556",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CVE-2009-1556",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "VHN-39002",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:S/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-1556",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#639345",
            "trust": 0.8,
            "value": "2.73"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#528993",
            "trust": 0.8,
            "value": "1.59"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-1556",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200905-070",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-39002",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39002"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003390"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-070"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1556"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "img/main.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote authenticated users to read arbitrary files in img/ via a filename in the next_file parameter, as demonstrated by reading .htpasswd to obtain the admin password, a different vulnerability than CVE-2004-2507. The Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control contains a stack buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. The Linksys WVC54GC wireless video camera insecurely sends initial configuration information over the network, which can allow a remote, unauthenticated attacker to intercept video streams, access wireless network authentication credentials, modify the device firmware, or cause a denial-of-service to the video camera. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera is prone to an information-disclosure vulnerability. \nExploiting this issue can allow a remote attacker to harvest sensitive information such as the administrator\u0027s password, which can lead to a complete compromise of the device. \nLinksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. The Linksys WVC54GCA management console does not properly filter the next_file parameter submitted by the main.cgi program, and remote attackers can retrieve the contents of the current directory by submitting malicious requests. If the contents of .htpasswd are retrieved, the user can perform arbitrary operations by logging into the console without authorization. ----------------------------------------------------------------------\n\nSecunia is pleased to announce the release of the annual Secunia\nreport for 2008. \n\nHighlights from the 2008 report:\n * Vulnerability Research\n * Software Inspection Results\n * Secunia Research Highlights\n * Secunia Advisory Statistics\n\nRequest the full 2008 Report here:\nhttp://secunia.com/advisories/try_vi/request_2008_report/\n\nStay Secure,\n\nSecunia\n\n\n----------------------------------------------------------------------\n\nTITLE:\nLinksys WVC54GCA Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA34767\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/34767/\n\nDESCRIPTION:\npagvac has reported some vulnerabilities in Linksys WVC54GCA, which\ncan be exploited by malicious people to disclose sensitive\ninformation or conduct cross-site scripting attacks, and by malicious\nusers to bypass certain security restrictions. \n\n1) The device sends e.g. login credentials in plain text after\nreceiving a specially crafted UDP packet. This can be\nexploited to read the .htpasswd file from the current directory and\ndisclose the administrator\u0027s password. \n\nSuccessful exploitation of this vulnerability requires valid user\ncredentials. \n\n3) Input passed to the \"next_file\" parameter in img/main.cgi,\nmain.cgi, and adm/file.cgi is not properly sanitised before being\nreturned to the user. This can be exploited to execute arbitrary HTML\nand script code in a user\u0027s browser session in context of an affected\nsite. \n\nThe vulnerabilities are reported in firmware versions 1.00R22 and\n1.00R24. Other versions may also be affected. \n\nSOLUTION:\nUse the product in trusted networks only. \n\nFilter malicious characters and character sequences in a web proxy. \n\nPROVIDED AND/OR DISCOVERED BY:\npagvac\n\nORIGINAL ADVISORY:\nhttp://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/\nhttp://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/\nhttp://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/\n\nOTHER REFERENCES:\nSA33032:\nhttp://secunia.com/advisories/33032/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\n1) A security issue is caused due to the device sending certain\ninformation (e.g. This can be exploited to\ngain access to sensitive information by sending a specially crafted\npacket to a vulnerable device. \n\n2) A vulnerability is caused due to a boundary error in the\n\"SetSource()\" method of the NetCamPlayerWeb11gv2 ActiveX control\n(NetCamPlayerWeb11gv2.ocx). This can be exploited to cause a\nstack-based buffer overflow by e.g. tricking a user into visiting a\nmalicious website. \n\nSOLUTION:\nUpdate to version 1.25. \n\nPROVIDED AND/OR DISCOVERED BY:\nUS-CERT credits Greg Linares, eEye",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-1556"
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003390"
      },
      {
        "db": "BID",
        "id": "34629"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39002"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      }
    ],
    "trust": 3.6
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-1556",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "34629",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "34767",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1173",
        "trust": 1.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345",
        "trust": 0.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003390",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-070",
        "trust": 0.6
      },
      {
        "db": "SECUNIA",
        "id": "33032",
        "trust": 0.2
      },
      {
        "db": "OTHER",
        "id": "NONE",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-39002",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "76983",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "72709",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39002"
      },
      {
        "db": "BID",
        "id": "34629"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003390"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-070"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1556"
      }
    ]
  },
  "id": "VAR-200905-0188",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-39002"
      }
    ],
    "trust": 0.02
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "camera device"
        ],
        "sub_category": "video camera",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      }
    ]
  },
  "last_update_date": "2025-04-10T21:39:30.578000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003390"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39002"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003390"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1556"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/34629"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/34767"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2009/1173"
      },
      {
        "trust": 1.6,
        "url": "about vulnerability notes"
      },
      {
        "trust": 1.6,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 1.6,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1556"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1556"
      },
      {
        "trust": 0.3,
        "url": "http://www.linksysbycisco.com/us/en/products/wvc54gca"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/33032/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "https://ieeexplore.ieee.org/abstract/document/10769424"
      },
      {
        "trust": 0.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/34767/"
      },
      {
        "trust": 0.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/try_vi/request_2008_report/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/528993"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/639345"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/20682/"
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39002"
      },
      {
        "db": "BID",
        "id": "34629"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003390"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-070"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1556"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39002"
      },
      {
        "db": "BID",
        "id": "34629"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003390"
      },
      {
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-070"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1556"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "date": "2009-05-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39002"
      },
      {
        "date": "2009-04-20T00:00:00",
        "db": "BID",
        "id": "34629"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003390"
      },
      {
        "date": "2009-04-27T15:17:22",
        "db": "PACKETSTORM",
        "id": "76983"
      },
      {
        "date": "2008-12-08T17:18:51",
        "db": "PACKETSTORM",
        "id": "72709"
      },
      {
        "date": "2009-04-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-070"
      },
      {
        "date": "2009-05-06T16:30:00.593000",
        "db": "NVD",
        "id": "CVE-2009-1556"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#639345"
      },
      {
        "date": "2008-12-05T00:00:00",
        "db": "CERT/CC",
        "id": "VU#528993"
      },
      {
        "date": "2009-05-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39002"
      },
      {
        "date": "2009-05-21T05:21:00",
        "db": "BID",
        "id": "34629"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003390"
      },
      {
        "date": "2009-05-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-070"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2009-1556"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-070"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linksys WVC54GC NetCamPlayerWeb11gv2 ActiveX control stack buffer overflow",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#639345"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-070"
      }
    ],
    "trust": 0.6
  }
}

VAR-200905-0190

Vulnerability from variot - Updated: 2025-04-10 20:49

Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera is prone to multiple directory-traversal vulnerabilities because the software fails to sufficiently sanitize user-supplied input. An attacker can exploit these issues using directory-traversal strings ('../') to download arbitrary files with the privileges of the server process. Information obtained may aid in further attacks. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. The Linksys WVC54GCA is a wireless network camera

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200905-0190",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.00r24"
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.00r22"
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "1.00r22 and  1.00r24"
      },
      {
        "model": "wvc54gca 1.00r24",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "wvc54gca 1.00r22",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "34713"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003392"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-072"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1558"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:cisco:wvc54gca",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003392"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "pagvac",
    "sources": [
      {
        "db": "BID",
        "id": "34713"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-072"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2009-1558",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2009-1558",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-39004",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-1558",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-1558",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200905-072",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-39004",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2009-1558",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39004"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1558"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003392"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-072"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1558"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera is prone to multiple directory-traversal vulnerabilities because the software fails to sufficiently sanitize user-supplied input. \nAn attacker can exploit these issues using directory-traversal strings (\u0027../\u0027) to download arbitrary files with the privileges of the server process. Information obtained may aid in further attacks. \nLinksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. The Linksys WVC54GCA is a wireless network camera",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-1558"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003392"
      },
      {
        "db": "BID",
        "id": "34713"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39004"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1558"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-39004",
        "trust": 0.1,
        "type": "unknown"
      },
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=32954",
        "trust": 0.1,
        "type": "exploit"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39004"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1558"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-1558",
        "trust": 2.7
      },
      {
        "db": "BID",
        "id": "34713",
        "trust": 2.1
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1173",
        "trust": 1.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003392",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "54",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "50231",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-072",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "32954",
        "trust": 0.2
      },
      {
        "db": "OTHER",
        "id": "NONE",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-86215",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-39004",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1558",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-39004"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1558"
      },
      {
        "db": "BID",
        "id": "34713"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003392"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-072"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1558"
      }
    ]
  },
  "id": "VAR-200905-0190",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-39004"
      }
    ],
    "trust": 0.02
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "camera device"
        ],
        "sub_category": "video camera",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      }
    ]
  },
  "last_update_date": "2025-04-10T20:49:26.486000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.cisco.com/"
      },
      {
        "title": "Kenzer Templates [5170] [DEPRECATED]",
        "trust": 0.1,
        "url": "https://github.com/ARPSyndicate/kenzer-templates "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2009-1558"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003392"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-22",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003392"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1558"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/bid/34713"
      },
      {
        "trust": 1.8,
        "url": "http://www.vupen.com/english/advisories/2009/1173"
      },
      {
        "trust": 1.2,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1558"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1558"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/50231"
      },
      {
        "trust": 0.3,
        "url": "http://www.linksysbycisco.com/us/en/products/wvc54gca"
      },
      {
        "trust": 0.1,
        "url": "https://ieeexplore.ieee.org/abstract/document/10769424"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/22.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.exploit-db.com/exploits/32954/"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/arpsyndicate/kenzer-templates"
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-39004"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1558"
      },
      {
        "db": "BID",
        "id": "34713"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003392"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-072"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1558"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-39004"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1558"
      },
      {
        "db": "BID",
        "id": "34713"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003392"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-072"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1558"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-05-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39004"
      },
      {
        "date": "2009-05-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2009-1558"
      },
      {
        "date": "2009-04-23T00:00:00",
        "db": "BID",
        "id": "34713"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003392"
      },
      {
        "date": "2009-04-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-072"
      },
      {
        "date": "2009-05-06T16:30:00.627000",
        "db": "NVD",
        "id": "CVE-2009-1558"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39004"
      },
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2009-1558"
      },
      {
        "date": "2009-04-27T13:36:00",
        "db": "BID",
        "id": "34713"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003392"
      },
      {
        "date": "2009-05-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-072"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2009-1558"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-072"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Linksys WVC54GCA Wireless camcorder  adm/file.cgi Vulnerable to directory traversal",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003392"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "path traversal",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-072"
      }
    ],
    "trust": 0.6
  }
}

VAR-200905-0191

Vulnerability from variot - Updated: 2025-04-10 19:54

Absolute path traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R24 and possibly 1.00R22 allows remote attackers to read arbitrary files via an absolute pathname in the this_file parameter. NOTE: traversal via a .. (dot dot) is probably also possible. Wvc54gca is prone to a directory traversal vulnerability. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera is prone to multiple directory-traversal vulnerabilities because the software fails to sufficiently sanitize user-supplied input. An attacker can exploit these issues using directory-traversal strings ('../') to download arbitrary files with the privileges of the server process. Information obtained may aid in further attacks. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. The Linksys WVC54GCA is a wireless network camera

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200905-0191",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.00r24"
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.00r22"
      },
      {
        "model": "wvc54gca",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "1.00r22 and  1.00r24"
      },
      {
        "model": "wvc54gca 1.00r24",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "wvc54gca 1.00r22",
        "scope": null,
        "trust": 0.3,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "wvc54gca 1.00r24",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      },
      {
        "model": "wvc54gca 1.00r22",
        "scope": null,
        "trust": 0.3,
        "vendor": "linksys",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "79495"
      },
      {
        "db": "BID",
        "id": "34713"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003393"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-073"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1559"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:cisco:wvc54gca",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003393"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "pagvac",
    "sources": [
      {
        "db": "BID",
        "id": "34713"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-073"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2009-1559",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2009-1559",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-39005",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-1559",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-1559",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200905-073",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-39005",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39005"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003393"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-073"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1559"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Absolute path traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R24 and possibly 1.00R22 allows remote attackers to read arbitrary files via an absolute pathname in the this_file parameter.  NOTE: traversal via a .. (dot dot) is probably also possible. Wvc54gca is prone to a directory traversal vulnerability. Linksys WVC54GCA Wireless-G Internet Home Monitoring Camera is prone to multiple directory-traversal vulnerabilities because the software fails to sufficiently sanitize user-supplied input. \nAn attacker can exploit these issues using directory-traversal strings (\u0027../\u0027) to download arbitrary files with the privileges of the server process. Information obtained may aid in further attacks. \nLinksys WVC54GCA Wireless-G Internet Home Monitoring Camera firmware 1.00R22 and 1.00R24 are affected; other versions may also be vulnerable. The Linksys WVC54GCA is a wireless network camera",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-1559"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003393"
      },
      {
        "db": "BID",
        "id": "79495"
      },
      {
        "db": "BID",
        "id": "34713"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39005"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-1559",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "34713",
        "trust": 2.3
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-1173",
        "trust": 1.7
      },
      {
        "db": "XF",
        "id": "50231",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003393",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "54",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-073",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "79495",
        "trust": 0.4
      },
      {
        "db": "OTHER",
        "id": "NONE",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-39005",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-39005"
      },
      {
        "db": "BID",
        "id": "79495"
      },
      {
        "db": "BID",
        "id": "34713"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003393"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-073"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1559"
      }
    ]
  },
  "id": "VAR-200905-0191",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-39005"
      }
    ],
    "trust": 0.02
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "camera device"
        ],
        "sub_category": "video camera",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      }
    ]
  },
  "last_update_date": "2025-04-10T19:54:32.114000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003393"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-22",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39005"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003393"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1559"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
      },
      {
        "trust": 2.0,
        "url": "http://www.securityfocus.com/bid/34713"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2009/1173"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
      },
      {
        "trust": 0.9,
        "url": "http://xforce.iss.net/xforce/xfdb/50231"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1559"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1559"
      },
      {
        "trust": 0.3,
        "url": "http://www.linksysbycisco.com/us/en/products/wvc54gca"
      },
      {
        "trust": 0.1,
        "url": "https://ieeexplore.ieee.org/abstract/document/10769424"
      }
    ],
    "sources": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-39005"
      },
      {
        "db": "BID",
        "id": "79495"
      },
      {
        "db": "BID",
        "id": "34713"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003393"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-073"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1559"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "OTHER",
        "id": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-39005"
      },
      {
        "db": "BID",
        "id": "79495"
      },
      {
        "db": "BID",
        "id": "34713"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003393"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200905-073"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1559"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-05-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39005"
      },
      {
        "date": "2009-05-06T00:00:00",
        "db": "BID",
        "id": "79495"
      },
      {
        "date": "2009-04-23T00:00:00",
        "db": "BID",
        "id": "34713"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003393"
      },
      {
        "date": "2009-04-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-073"
      },
      {
        "date": "2009-05-06T16:30:00.657000",
        "db": "NVD",
        "id": "CVE-2009-1559"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39005"
      },
      {
        "date": "2009-05-06T00:00:00",
        "db": "BID",
        "id": "79495"
      },
      {
        "date": "2009-04-27T13:36:00",
        "db": "BID",
        "id": "34713"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003393"
      },
      {
        "date": "2009-05-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200905-073"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2009-1559"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "79495"
      },
      {
        "db": "BID",
        "id": "34713"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Linksys WVC54GCA On wireless camcorder  adm/file.cgi Vulnerable to absolute path traversal",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003393"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Input Validation Error",
    "sources": [
      {
        "db": "BID",
        "id": "79495"
      },
      {
        "db": "BID",
        "id": "34713"
      }
    ],
    "trust": 0.6
  }
}

CVE-2009-1559 (GCVE-0-2009-1559)

Vulnerability from nvd – Published: 2009-05-06 16:00 – Updated: 2024-08-07 05:20
VLAI?
Summary
Absolute path traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R24 and possibly 1.00R22 allows remote attackers to read arbitrary files via an absolute pathname in the this_file parameter. NOTE: traversal via a .. (dot dot) is probably also possible.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Date Public ?
2009-04-23 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:34.000Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "wvc54gca-admfile-dir-traversal(50231)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
          },
          {
            "name": "34713",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34713"
          },
          {
            "name": "ADV-2009-1173",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1173"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-23T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Absolute path traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R24 and possibly 1.00R22 allows remote attackers to read arbitrary files via an absolute pathname in the this_file parameter.  NOTE: traversal via a .. (dot dot) is probably also possible."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "wvc54gca-admfile-dir-traversal(50231)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
        },
        {
          "name": "34713",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34713"
        },
        {
          "name": "ADV-2009-1173",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1173"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1559",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Absolute path traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R24 and possibly 1.00R22 allows remote attackers to read arbitrary files via an absolute pathname in the this_file parameter.  NOTE: traversal via a .. (dot dot) is probably also possible."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "wvc54gca-admfile-dir-traversal(50231)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
            },
            {
              "name": "34713",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34713"
            },
            {
              "name": "ADV-2009-1173",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1173"
            },
            {
              "name": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/",
              "refsource": "MISC",
              "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1559",
    "datePublished": "2009-05-06T16:00:00.000Z",
    "dateReserved": "2009-05-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:20:34.000Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1558 (GCVE-0-2009-1558)

Vulnerability from nvd – Published: 2009-05-06 16:00 – Updated: 2024-08-07 05:20
VLAI?
Summary
Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Date Public ?
2009-04-23 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:33.708Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "wvc54gca-admfile-dir-traversal(50231)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
          },
          {
            "name": "34713",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34713"
          },
          {
            "name": "ADV-2009-1173",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1173"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-23T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "wvc54gca-admfile-dir-traversal(50231)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
        },
        {
          "name": "34713",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34713"
        },
        {
          "name": "ADV-2009-1173",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1173"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1558",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "wvc54gca-admfile-dir-traversal(50231)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
            },
            {
              "name": "34713",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34713"
            },
            {
              "name": "ADV-2009-1173",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1173"
            },
            {
              "name": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/",
              "refsource": "MISC",
              "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1558",
    "datePublished": "2009-05-06T16:00:00.000Z",
    "dateReserved": "2009-05-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:20:33.708Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1557 (GCVE-0-2009-1557)

Vulnerability from nvd – Published: 2009-05-06 16:00 – Updated: 2024-08-07 05:20
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allow remote attackers to inject arbitrary web script or HTML via the next_file parameter to (1) main.cgi, (2) img/main.cgi, or (3) adm/file.cgi; or (4) the this_file parameter to adm/file.cgi.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2009-04-25 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:33.952Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "wvc54gca-nextfile-xss(50224)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50224"
          },
          {
            "name": "34714",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34714"
          },
          {
            "name": "ADV-2009-1173",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1173"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/"
          },
          {
            "name": "34767",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34767"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-25T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allow remote attackers to inject arbitrary web script or HTML via the next_file parameter to (1) main.cgi, (2) img/main.cgi, or (3) adm/file.cgi; or (4) the this_file parameter to adm/file.cgi."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "wvc54gca-nextfile-xss(50224)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50224"
        },
        {
          "name": "34714",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34714"
        },
        {
          "name": "ADV-2009-1173",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1173"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/"
        },
        {
          "name": "34767",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34767"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1557",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allow remote attackers to inject arbitrary web script or HTML via the next_file parameter to (1) main.cgi, (2) img/main.cgi, or (3) adm/file.cgi; or (4) the this_file parameter to adm/file.cgi."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "wvc54gca-nextfile-xss(50224)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50224"
            },
            {
              "name": "34714",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34714"
            },
            {
              "name": "ADV-2009-1173",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1173"
            },
            {
              "name": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/",
              "refsource": "MISC",
              "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/"
            },
            {
              "name": "34767",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34767"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1557",
    "datePublished": "2009-05-06T16:00:00.000Z",
    "dateReserved": "2009-05-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:20:33.952Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1556 (GCVE-0-2009-1556)

Vulnerability from nvd – Published: 2009-05-06 16:00 – Updated: 2024-08-07 05:20
VLAI?
Summary
img/main.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote authenticated users to read arbitrary files in img/ via a filename in the next_file parameter, as demonstrated by reading .htpasswd to obtain the admin password, a different vulnerability than CVE-2004-2507.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2009-04-20 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:33.683Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/"
          },
          {
            "name": "ADV-2009-1173",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1173"
          },
          {
            "name": "34767",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34767"
          },
          {
            "name": "34629",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34629"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-20T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "img/main.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote authenticated users to read arbitrary files in img/ via a filename in the next_file parameter, as demonstrated by reading .htpasswd to obtain the admin password, a different vulnerability than CVE-2004-2507."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-05-23T09:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/"
        },
        {
          "name": "ADV-2009-1173",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1173"
        },
        {
          "name": "34767",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34767"
        },
        {
          "name": "34629",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34629"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1556",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "img/main.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote authenticated users to read arbitrary files in img/ via a filename in the next_file parameter, as demonstrated by reading .htpasswd to obtain the admin password, a different vulnerability than CVE-2004-2507."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/",
              "refsource": "MISC",
              "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/"
            },
            {
              "name": "ADV-2009-1173",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1173"
            },
            {
              "name": "34767",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34767"
            },
            {
              "name": "34629",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34629"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1556",
    "datePublished": "2009-05-06T16:00:00.000Z",
    "dateReserved": "2009-05-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:20:33.683Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1555 (GCVE-0-2009-1555)

Vulnerability from nvd – Published: 2009-05-06 16:00 – Updated: 2024-08-07 05:20
VLAI?
Summary
The Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 sends configuration data in response to a Setup Wizard remote-management command, which allows remote attackers to obtain sensitive information such as passwords by reading the SetupWizard.exe process memory, a related issue to CVE-2008-4390.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2009-04-20 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:34.469Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/"
          },
          {
            "name": "ADV-2009-1173",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1173"
          },
          {
            "name": "34596",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34596"
          },
          {
            "name": "34767",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34767"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-20T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 sends configuration data in response to a Setup Wizard remote-management command, which allows remote attackers to obtain sensitive information such as passwords by reading the SetupWizard.exe process memory, a related issue to CVE-2008-4390."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-05-23T09:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/"
        },
        {
          "name": "ADV-2009-1173",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1173"
        },
        {
          "name": "34596",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34596"
        },
        {
          "name": "34767",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34767"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1555",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 sends configuration data in response to a Setup Wizard remote-management command, which allows remote attackers to obtain sensitive information such as passwords by reading the SetupWizard.exe process memory, a related issue to CVE-2008-4390."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/",
              "refsource": "MISC",
              "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/"
            },
            {
              "name": "ADV-2009-1173",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1173"
            },
            {
              "name": "34596",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34596"
            },
            {
              "name": "34767",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34767"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1555",
    "datePublished": "2009-05-06T16:00:00.000Z",
    "dateReserved": "2009-05-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:20:34.469Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1559 (GCVE-0-2009-1559)

Vulnerability from cvelistv5 – Published: 2009-05-06 16:00 – Updated: 2024-08-07 05:20
VLAI?
Summary
Absolute path traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R24 and possibly 1.00R22 allows remote attackers to read arbitrary files via an absolute pathname in the this_file parameter. NOTE: traversal via a .. (dot dot) is probably also possible.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Date Public ?
2009-04-23 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:34.000Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "wvc54gca-admfile-dir-traversal(50231)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
          },
          {
            "name": "34713",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34713"
          },
          {
            "name": "ADV-2009-1173",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1173"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-23T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Absolute path traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R24 and possibly 1.00R22 allows remote attackers to read arbitrary files via an absolute pathname in the this_file parameter.  NOTE: traversal via a .. (dot dot) is probably also possible."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "wvc54gca-admfile-dir-traversal(50231)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
        },
        {
          "name": "34713",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34713"
        },
        {
          "name": "ADV-2009-1173",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1173"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1559",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Absolute path traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R24 and possibly 1.00R22 allows remote attackers to read arbitrary files via an absolute pathname in the this_file parameter.  NOTE: traversal via a .. (dot dot) is probably also possible."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "wvc54gca-admfile-dir-traversal(50231)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
            },
            {
              "name": "34713",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34713"
            },
            {
              "name": "ADV-2009-1173",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1173"
            },
            {
              "name": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/",
              "refsource": "MISC",
              "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1559",
    "datePublished": "2009-05-06T16:00:00.000Z",
    "dateReserved": "2009-05-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:20:34.000Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1555 (GCVE-0-2009-1555)

Vulnerability from cvelistv5 – Published: 2009-05-06 16:00 – Updated: 2024-08-07 05:20
VLAI?
Summary
The Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 sends configuration data in response to a Setup Wizard remote-management command, which allows remote attackers to obtain sensitive information such as passwords by reading the SetupWizard.exe process memory, a related issue to CVE-2008-4390.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2009-04-20 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:34.469Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/"
          },
          {
            "name": "ADV-2009-1173",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1173"
          },
          {
            "name": "34596",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34596"
          },
          {
            "name": "34767",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34767"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-20T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 sends configuration data in response to a Setup Wizard remote-management command, which allows remote attackers to obtain sensitive information such as passwords by reading the SetupWizard.exe process memory, a related issue to CVE-2008-4390."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-05-23T09:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/"
        },
        {
          "name": "ADV-2009-1173",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1173"
        },
        {
          "name": "34596",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34596"
        },
        {
          "name": "34767",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34767"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1555",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 sends configuration data in response to a Setup Wizard remote-management command, which allows remote attackers to obtain sensitive information such as passwords by reading the SetupWizard.exe process memory, a related issue to CVE-2008-4390."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/",
              "refsource": "MISC",
              "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/"
            },
            {
              "name": "ADV-2009-1173",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1173"
            },
            {
              "name": "34596",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34596"
            },
            {
              "name": "34767",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34767"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1555",
    "datePublished": "2009-05-06T16:00:00.000Z",
    "dateReserved": "2009-05-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:20:34.469Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1558 (GCVE-0-2009-1558)

Vulnerability from cvelistv5 – Published: 2009-05-06 16:00 – Updated: 2024-08-07 05:20
VLAI?
Summary
Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Date Public ?
2009-04-23 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:33.708Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "wvc54gca-admfile-dir-traversal(50231)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
          },
          {
            "name": "34713",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34713"
          },
          {
            "name": "ADV-2009-1173",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1173"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-23T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "wvc54gca-admfile-dir-traversal(50231)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
        },
        {
          "name": "34713",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34713"
        },
        {
          "name": "ADV-2009-1173",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1173"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1558",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "wvc54gca-admfile-dir-traversal(50231)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50231"
            },
            {
              "name": "34713",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34713"
            },
            {
              "name": "ADV-2009-1173",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1173"
            },
            {
              "name": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/",
              "refsource": "MISC",
              "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1558",
    "datePublished": "2009-05-06T16:00:00.000Z",
    "dateReserved": "2009-05-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:20:33.708Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1557 (GCVE-0-2009-1557)

Vulnerability from cvelistv5 – Published: 2009-05-06 16:00 – Updated: 2024-08-07 05:20
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allow remote attackers to inject arbitrary web script or HTML via the next_file parameter to (1) main.cgi, (2) img/main.cgi, or (3) adm/file.cgi; or (4) the this_file parameter to adm/file.cgi.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2009-04-25 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:33.952Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "wvc54gca-nextfile-xss(50224)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50224"
          },
          {
            "name": "34714",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34714"
          },
          {
            "name": "ADV-2009-1173",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1173"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/"
          },
          {
            "name": "34767",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34767"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-25T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allow remote attackers to inject arbitrary web script or HTML via the next_file parameter to (1) main.cgi, (2) img/main.cgi, or (3) adm/file.cgi; or (4) the this_file parameter to adm/file.cgi."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "wvc54gca-nextfile-xss(50224)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50224"
        },
        {
          "name": "34714",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34714"
        },
        {
          "name": "ADV-2009-1173",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1173"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/"
        },
        {
          "name": "34767",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34767"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1557",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allow remote attackers to inject arbitrary web script or HTML via the next_file parameter to (1) main.cgi, (2) img/main.cgi, or (3) adm/file.cgi; or (4) the this_file parameter to adm/file.cgi."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "wvc54gca-nextfile-xss(50224)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50224"
            },
            {
              "name": "34714",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34714"
            },
            {
              "name": "ADV-2009-1173",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1173"
            },
            {
              "name": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/",
              "refsource": "MISC",
              "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/"
            },
            {
              "name": "34767",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34767"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1557",
    "datePublished": "2009-05-06T16:00:00.000Z",
    "dateReserved": "2009-05-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:20:33.952Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1556 (GCVE-0-2009-1556)

Vulnerability from cvelistv5 – Published: 2009-05-06 16:00 – Updated: 2024-08-07 05:20
VLAI?
Summary
img/main.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote authenticated users to read arbitrary files in img/ via a filename in the next_file parameter, as demonstrated by reading .htpasswd to obtain the admin password, a different vulnerability than CVE-2004-2507.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2009-04-20 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:33.683Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/"
          },
          {
            "name": "ADV-2009-1173",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1173"
          },
          {
            "name": "34767",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34767"
          },
          {
            "name": "34629",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34629"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-20T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "img/main.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote authenticated users to read arbitrary files in img/ via a filename in the next_file parameter, as demonstrated by reading .htpasswd to obtain the admin password, a different vulnerability than CVE-2004-2507."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-05-23T09:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/"
        },
        {
          "name": "ADV-2009-1173",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1173"
        },
        {
          "name": "34767",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34767"
        },
        {
          "name": "34629",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34629"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1556",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "img/main.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote authenticated users to read arbitrary files in img/ via a filename in the next_file parameter, as demonstrated by reading .htpasswd to obtain the admin password, a different vulnerability than CVE-2004-2507."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/",
              "refsource": "MISC",
              "url": "http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/"
            },
            {
              "name": "ADV-2009-1173",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1173"
            },
            {
              "name": "34767",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34767"
            },
            {
              "name": "34629",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34629"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1556",
    "datePublished": "2009-05-06T16:00:00.000Z",
    "dateReserved": "2009-05-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:20:33.683Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}