We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2014-125122

Linksys WRT120N tmUnblock.cgi Stack-Based Buffer Overflow Admin Password Reset



Description

A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker can overwrite memory in a controlled manner, enabling them to temporarily reset the administrator password of the device to a blank value. This grants unauthorized access to the router’s web management interface without requiring valid credentials.

Reserved 2025-07-30 | Published 2025-07-31 | Updated 2025-07-31 | Assigner VulnCheck


MEDIUM: 5.3CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

1.0.07
affected

Credits

Craig Heffner finder

References

raw.githubusercontent.com/...ys_tmunblock_admin_reset_bof.rb exploit

www.exploit-db.com/exploits/31758 exploit

web.archive.org/...m/2014/02/wrt120n-fprintf-stack-overflow/ technical-description exploit

www.vulncheck.com/...ed-buffer-overflow-admin-password-reset third-party-advisory

cve.org (CVE-2014-125122)

nvd.nist.gov (CVE-2014-125122)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2014-125122

Support options

Helpdesk Chat, Email, Knowledgebase