CVE-2006-7121

Current Description

The HTTP server in Linksys SPA-921 VoIP Desktop Phone allows remote attackers to cause a denial of service (reboot) via (1) a long URL, or a long (2) username or (3) password during Basic Authentication.

Basic Data

PublishedMarch 06, 2007
Last ModifiedJuly 29, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.8
SeverityHIGH
Exploitability Score10.0
Impact Score6.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3HardwareLinksysSpa9211.0.0*******

Vulnerable Software List

VendorProductVersions
Linksys Spa921 1.0.0

References

NameSourceURLTags
20061004 (0-day) Linksys SPA-921 VoIP Desktop Phone HTTP Server DoShttp://archives.neohapsis.com/archives/fulldisclosure/2006-10/0089.htmlFULLDISC
22267http://secunia.com/advisories/22267SECUNIAVendor Advisory
29671http://www.osvdb.org/29671OSVDB
20346http://www.securityfocus.com/bid/20346BID
linksys-spa921-long-username-dos(29349)https://exchange.xforce.ibmcloud.com/vulnerabilities/29349XF