{ "schema_version": "1.4.0", "id": "GHSA-w73f-pxm3-f825", "modified": "2025-04-09T03:52:32Z", "published": "2022-05-01T18:45:47Z", "aliases": [ "CVE-2007-6708" ], "details": "Multiple cross-site request forgery (CSRF) vulnerabilities on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and earlier firmware allow remote attackers to perform actions as administrators via an arbitrary valid request to an administrative URI, as demonstrated by (1) a Restore Factory Defaults action using the mtenRestore parameter to setup.cgi and (2) creation of a user account using the sysname parameter to setup.cgi.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6708" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41269" }, { "type": "WEB", "url": "http://osvdb.org/43537" }, { "type": "WEB", "url": "http://osvdb.org/43538" }, { "type": "WEB", "url": "http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs" }, { "type": "WEB", "url": "http://www.gnucitizen.org/projects/router-hacking-challenge" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/489009/100/0/threaded" } ], "database_specific": { "cwe_ids": [ "CWE-352" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-03-13T18:44:00Z" } }