lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <f1d746770510121336s26569a61u@mail.gmail.com> Date: Thu Oct 13 03:05:38 2005 From: shell6 at gmail.com (Shell) Subject: WRT54G directory trasversial vulnerability I just found a vulnerability in Linksys WRT54G routers. http://192.168.1.1/apply.cgi?action=../ It loads the page after action http://192.168.1.1/apply.cgi?action=../ returns the setup page http://192.168.1.1/apply.cgi?action=../blah returns that the file does not exist