Linksys WRT54GS POST Request Configuration Change Authentication Bypass Vulnerability

Attackers may exploit this issue using a command-line tool (such as 'curl') for transferring files with URL syntax.

A sample exploit 'curl' command line has been provided:


 

Privacy Statement
Copyright 2010, SecurityFocus