Linksys WVC54GCA Wireless-G '/img/main.cgi' Information Disclosure

medium Nessus Plugin ID 38152

Synopsis

Authenticated users can elevate their privileges on the remote network camera.

Description

The remote host is a Linksys WVC54GCA network camera.

The version of the firmware of the remote camera contains a flaw that allows authenticated users to download the .htpasswd file from the remote host, which gives them the ability to crack the passwords of other users, including the password of the administrator.

Solution

Contact your vendor for a patch.

See Also

https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/

Plugin Details

Severity: Medium

ID: 38152

File Name: cisco_WVC54GCA_info_disclosure.nasl

Version: 1.15

Type: remote

Family: CGI abuses

Published: 4/24/2009

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.8

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N

Vulnerability Information

CPE: cpe:/h:cisco:wvc54gca

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2009-1556

BID: 34629

CWE: 200