An issue was discovered in Linksys Router E1700 1.0.04 (build 3), allows authenticated attackers to escalate privileges via a crafted GET request to the /goform/* URI or via the ExportSettings function.
References
| Link | Resource |
|---|---|
| https://mat4mee.notion.site/Leaked-SessionID-can-lead-to-authentication-bypass-on-the-Linksys-Router-E1700-f56f9c4b15e7443fa237bd1b101a18d2 | Exploit Third Party Advisory |
| https://mat4mee.notion.site/Leaked-SessionID-can-lead-to-authentication-bypass-on-the-Linksys-Router-E1700-f56f9c4b15e7443fa237bd1b101a18d2 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2024-02-27 01:15
Updated : 2025-04-08 14:41
NVD link : CVE-2024-22543
Mitre link : CVE-2024-22543
CVE.ORG link : CVE-2024-22543
JSON object : View
Products Affected
linksys
- e1700_firmware
- e1700
CWE
CWE-613
Insufficient Session Expiration
