CVE-2020-35716

Published: Dic 26, 2020 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2020-23373 Aliases: GSD-2020-35716
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,5
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
HIGH 7,8
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: none
Integrity: none
Availability: complete

Description

AI Translation Available

Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to cause a persistent denial of service (segmentation fault) via a long /goform/langSwitch langSelectionOnly parameter.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0141
Percentile
0,8th
Updated

EPSS Score Trend (Last 90 Days)

Operating System

Re6500 Firmware by Linksys

Version Range Affected
To 1.0.012.001 (exclusive)
cpe:2.3:o:linksys:re6500_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-r…
https://downloads.linksys.com/support/assets/releasenotes/ExternalReleaseNotes_…
https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-fu…
https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-r…
https://downloads.linksys.com/support/assets/releasenotes/ExternalReleaseNotes_…
https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-fu…