πŸ” CVE Alert

CVE-2014-125122

UNKNOWN 0.0

Linksys WRT120N tmUnblock.cgi Stack-Based Buffer Overflow Admin Password Reset

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker can overwrite memory in a controlled manner, enabling them to temporarily reset the administrator password of the device to a blank value. This grants unauthorized access to the router’s web management interface without requiring valid credentials.

CWE CWE-121
Vendor linksys
Product wrt120n
Published Jul 31, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for linksys wrt120n

Be the first to know when new unknown vulnerabilities affecting linksys wrt120n are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

Affected Versions

Linksys / WRT120N
1.0.07

References

NVD β†— CVE.org β†— EPSS Data β†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/admin/http/linksys_tmunblock_admin_reset_bof.rb exploit-db.com: https://www.exploit-db.com/exploits/31758 web.archive.org: https://web.archive.org/web/20210424073058/http://www.devttys0.com/2014/02/wrt120n-fprintf-stack-overflow/ vulncheck.com: https://www.vulncheck.com/advisories/linksys-wrt120n-stack-based-buffer-overflow-admin-password-reset

Credits

Craig Heffner