Security Information and Review

Collection of security information and review

The Latest Linksys WAP4400N Vulnerability

Author : Admin

Linksys WAP4400N uses the draft version of the upcoming 802.11n standard that is claimed with data transfer rate 300 Mbps. This access point has full feature such support HTTP/HTTPS protocol, SNMP v1, SNMP v2c or SNMP v3 and work at frequency 2.4 GHz. Others feature in this machine : DHCP support, load balancing, syslog, MAC filtering and others, support WPA, WPA2, WPA-PSK, 64-bit WEP and 128-bit WEP algorithm. Get more detail about this product at Cisco / Linksys web site.

The latest Linksys WAP4400N vulnerability was discovered. With this vulnerability, an attacker can exploit to cause a denial of service ( DOS ). If an attacker with a malicious code can exploit this vulnerability, the wireless access point will reboot or hang and possibly remote arbitrary code execution.

Linksys WAP4400N

Linksys WAP4400N


This vulnerability can be triggered by attacker with a malicious association request to LinkSys WAP4400N when parsing information elements, uses an inappropriate length, typically too long to process. This vulnerability can be achieved only after a successful 802.11 authentication.

This vulnerability will affected on Linksys WAP4400N based on Marvell 88W8361P-BEM1 chipset with firmware v1.2.17. Cisco / Linksys was released new firmware to patch this vulnerability. So we can get update this firmware to version 1.2.19 on Cisco / Linksys web site.

Originally advisory was provided / discovered by Laurent Butti form France Telecom.

Share and Enjoy: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Netvouz
  • DZone
  • ThisNext
  • MisterWong
  • Wists
  • Technorati
  • YahooMyWeb
  • Slashdot
  • StumbleUpon
Categories: device security
If you like this posts, please leave messages / comments.