Several Linksys Broadband Router devices are prone to a buffer overflow conditions. This vulnerability is due to insufficient allocation of space for local buffers. An attacker can exploit this vulnerability by issuing an overly long request to the vulnerable device. When the device attempts to process the malformed input, it will be possible to corrupt sensitive memory. This may allow an attacker to change configuration information on the vulnerable device. This vulnerability is only exploitable if UPnP (Universal Plug and Play) is enabled on the device.
Several Linksys Broadband Router devices are prone to a buffer overflow conditions. This vulnerability is due to insufficient allocation of space for local buffers. An attacker can exploit this vulnerability by issuing an overly long request to the vulnerable device. When the device attempts to process the malformed input, it will be possible to corrupt sensitive memory. This may allow an attacker to change configuration information on the vulnerable device. This vulnerability is only exploitable if UPnP (Universal Plug and Play) is enabled on the device.