Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote attackers to obtain the administrator's MD5 password hash via a direct request for the /.htpasswd URI.

Project Subscriptions

Vendors Products
Linksys Subscribe
E4200v2 Subscribe
E4200v2 Firmware Subscribe
Ea2700 Firmware Subscribe
Ea3500 Firmware Subscribe
Ea4500 Firmware Subscribe
Ea6200 Firmware Subscribe
Ea6300 Firmware Subscribe
Ea6400 Firmware Subscribe
Ea6500 Firmware Subscribe
Ea6700 Firmware Subscribe
Ea6900 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2014-8084 Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote attackers to obtain the administrator's MD5 password hash via a direct request for the /.htpasswd URI.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-06T13:10:50.927Z

Reserved: 2014-10-12T00:00:00.000Z

Link: CVE-2014-8243

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-11-01T10:55:02.790

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-8243

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses