Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in administration.cgi on the Cisco Linksys WRT54GC router with firmware 1.05.7 allows remote attackers to hijack the intranet connectivity of arbitrary users for requests that change the administrator password via the sysPasswd and sysConfirmPasswd parameters."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2009-05-06T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"name": "20090418 Linksys WRT54GC - Admin Password Change (POC)", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://archives.neohapsis.com/archives/bugtraq/2009-04/0198.html"}, {"tags": ["x_refsource_MISC"], "url": "http://packetstormsecurity.org/0904-exploits/linksysadmin-passwd.txt"}, {"name": "ADV-2009-1172", "tags": ["vdb-entry", "x_refsource_VUPEN"], "url": "http://www.vupen.com/english/advisories/2009/1172"}, {"tags": ["x_refsource_MISC"], "url": "http://www.falandodeseguranca.com/?p=17"}, {"name": "34616", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/34616"}, {"name": "34805", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/34805"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1561", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in administration.cgi on the Cisco Linksys WRT54GC router with firmware 1.05.7 allows remote attackers to hijack the intranet connectivity of arbitrary users for requests that change the administrator password via the sysPasswd and sysConfirmPasswd parameters."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "20090418 Linksys WRT54GC - Admin Password Change (POC)", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2009-04/0198.html"}, {"name": "http://packetstormsecurity.org/0904-exploits/linksysadmin-passwd.txt", "refsource": "MISC", "url": "http://packetstormsecurity.org/0904-exploits/linksysadmin-passwd.txt"}, {"name": "ADV-2009-1172", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1172"}, {"name": "http://www.falandodeseguranca.com/?p=17", "refsource": "MISC", "url": "http://www.falandodeseguranca.com/?p=17"}, {"name": "34616", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34616"}, {"name": "34805", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34805"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-07T05:20:33.452Z"}, "title": "CVE Program Container", "references": [{"name": "20090418 Linksys WRT54GC - Admin Password Change (POC)", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://archives.neohapsis.com/archives/bugtraq/2009-04/0198.html"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://packetstormsecurity.org/0904-exploits/linksysadmin-passwd.txt"}, {"name": "ADV-2009-1172", "tags": ["vdb-entry", "x_refsource_VUPEN", "x_transferred"], "url": "http://www.vupen.com/english/advisories/2009/1172"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://www.falandodeseguranca.com/?p=17"}, {"name": "34616", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/34616"}, {"name": "34805", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/34805"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1561", "datePublished": "2009-05-06T16:00:00Z", "dateReserved": "2009-05-06T00:00:00Z", "dateUpdated": "2024-09-17T01:11:40.144Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}