{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T00:29:50.424","vulnerabilities":[{"cve":{"id":"CVE-2009-1561","sourceIdentifier":"cve@mitre.org","published":"2009-05-06T16:30:00.703","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site request forgery (CSRF) vulnerability in administration.cgi on the Cisco Linksys WRT54GC router with firmware 1.05.7 allows remote attackers to hijack the intranet connectivity of arbitrary users for requests that change the administrator password via the sysPasswd and sysConfirmPasswd parameters."},{"lang":"es","value":"Vulnerabilidad de falsificación de petición en sitios cruzados (CSFR) en administration.cgi  en el router  Cisco Linksys WRT54GC con firmware v1.05.7, permite a atacantes remotos secuestrar la conectividad de la intranet de usuarios de su elección para peticiones que modifican la contraseña de administrador a través de los parámetros \"sysPasswd\" y \"sysConfirmPasswd\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:wrt54gc:1.05.7:*:*:*:*:*:*:*","matchCriteriaId":"14D5B1F5-59CF-469F-B889-A802E6262341"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2009-04/0198.html","source":"cve@mitre.org"},{"url":"http://packetstormsecurity.org/0904-exploits/linksysadmin-passwd.txt","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://secunia.com/advisories/34805","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.falandodeseguranca.com/?p=17","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/34616","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.vupen.com/english/advisories/2009/1172","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2009-04/0198.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://packetstormsecurity.org/0904-exploits/linksysadmin-passwd.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://secunia.com/advisories/34805","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.falandodeseguranca.com/?p=17","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/34616","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.vupen.com/english/advisories/2009/1172","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}