Não sei até q ponto vos pode afectar, mas já q recebi a info, publicito
Some of the implications are that a remote attacker may acquire administrative access to the router, view potentially sensitive configuration information, and change the router configuration or firmware.
For all of the problems, the attacker has to have access to either the wireless, or internal LAN network segments of the affected device. Exploitation from the WAN interface is only possible if the affected device has remote management enabled. But the existence of many wireless routers insufficiently protected against unauthorized use means that the number of routers open to these attacks is large.
The first issue is a bug in the 'upgrade.cgi' and 'restore.cgi' components of the router (such routers actually function as web servers for their administration; restore.cgi is a script running on that web server). These components may allow unauthorized users to upload configuration information and firmware files to the router.
The 'ezconfig.asp' component has a fixed authentication key, allowing attackers to download and replace the configuration of affected routers. The 'apply.cgi' page has a buffer overflow problem with large HTTP POST requests, allowing attackers to execute arbitrary machine code.
Several unspecified components in the server fail to validate the 'Content-Length' request header properly. This could allow attackers to initiate a denial of service on the router.
These vulnerabilities are addressed in firmware version 4.20.7 available for download from Linksys.
http://www.pcmag.com/article2/0,1895,1860721,00.asp
Some of the implications are that a remote attacker may acquire administrative access to the router, view potentially sensitive configuration information, and change the router configuration or firmware.
For all of the problems, the attacker has to have access to either the wireless, or internal LAN network segments of the affected device. Exploitation from the WAN interface is only possible if the affected device has remote management enabled. But the existence of many wireless routers insufficiently protected against unauthorized use means that the number of routers open to these attacks is large.
The first issue is a bug in the 'upgrade.cgi' and 'restore.cgi' components of the router (such routers actually function as web servers for their administration; restore.cgi is a script running on that web server). These components may allow unauthorized users to upload configuration information and firmware files to the router.
The 'ezconfig.asp' component has a fixed authentication key, allowing attackers to download and replace the configuration of affected routers. The 'apply.cgi' page has a buffer overflow problem with large HTTP POST requests, allowing attackers to execute arbitrary machine code.
Several unspecified components in the server fail to validate the 'Content-Length' request header properly. This could allow attackers to initiate a denial of service on the router.
These vulnerabilities are addressed in firmware version 4.20.7 available for download from Linksys.
http://www.pcmag.com/article2/0,1895,1860721,00.asp