CVE-2014-8243
Summary
| CVE | CVE-2014-8243 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-11-01 10:55:00 UTC |
| Updated | 2014-11-04 02:38:00 UTC |
| Description | Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote attackers to obtain the administrator's MD5 password hash via a direct request for the /.htpasswd URI. |
Risk And Classification
Problem Types: CWE-310
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Linksys | E4200v2 | - | All | All | All |
| Hardware | Linksys | E4200v2 | - | All | All | All |
| Operating System | Linksys | E4200v2 Firmware | All | All | All | All |
| Hardware | Linksys | Ea2700 | - | All | All | All |
| Hardware | Linksys | Ea2700 | - | All | All | All |
| Operating System | Linksys | Ea2700 Firmware | All | All | All | All |
| Hardware | Linksys | Ea3500 | - | All | All | All |
| Hardware | Linksys | Ea3500 | - | All | All | All |
| Operating System | Linksys | Ea3500 Firmware | All | All | All | All |
| Hardware | Linksys | Ea4500 | - | All | All | All |
| Hardware | Linksys | Ea4500 | - | All | All | All |
| Operating System | Linksys | Ea4500 Firmware | All | All | All | All |
| Hardware | Linksys | Ea6200 | - | All | All | All |
| Hardware | Linksys | Ea6200 | - | All | All | All |
| Operating System | Linksys | Ea6200 Firmware | All | 153743 | All | All |
| Hardware | Linksys | Ea6300 | - | All | All | All |
| Hardware | Linksys | Ea6300 | - | All | All | All |
| Operating System | Linksys | Ea6300 Firmware | All | 153731 | All | All |
| Hardware | Linksys | Ea6400 | - | All | All | All |
| Hardware | Linksys | Ea6400 | - | All | All | All |
| Operating System | Linksys | Ea6400 Firmware | All | 153731 | All | All |
| Hardware | Linksys | Ea6500 | - | All | All | All |
| Hardware | Linksys | Ea6500 | - | All | All | All |
| Operating System | Linksys | Ea6500 Firmware | All | 153731 | All | All |
| Hardware | Linksys | Ea6700 | - | All | All | All |
| Hardware | Linksys | Ea6700 | - | All | All | All |
| Operating System | Linksys | Ea6700 Firmware | All | 153731 | All | All |
| Hardware | Linksys | Ea6900 | - | All | All | All |
| Hardware | Linksys | Ea6900 | - | All | All | All |
| Operating System | Linksys | Ea6900 Firmware | All | 158863 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| VU#447516 - Linksys SMART WiFi firmware contains multiple vulnerabilities | CERT-VN | www.kb.cert.org | Exploit, Patch, Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.