[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-14002":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":46,"name":47,"published":48,"updated":34},14002,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":34,"risk_description":34,"public_description":35,"public_recommendation":36,"recommendation":34,"references":37,"cvssv3":34,"epss_score":41,"epss_percentile":42,"cve":43,"in_cisa_catalog":45,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"The remote host seems to be a Linksys EtherFast Cable Firewall/Router. This product is vulnerable to a remote Denial of service attack : if logging is enabled, an attacker can specify a long URL which results in the router becoming unresponsive.","Update firmware to version 1.45.3.",[38,39,40],"http://www.digitalpranksters.com/advisories/linksys/LinksysBEFSX41DoSa.html","http://www.securityfocus.com/bid/8834","http://www.linksys.com/download/firmware.asp?fwid=172",0.01181,0.78743,[44],"CVE-2003-1497",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.11891","LinkSys EtherFast Router Denial of Service Attack","2018-01-02T00:00:00Z"]