Medium severityNVD Advisory· Published Jul 31, 2025· Updated Apr 15, 2026
CVE-2014-125122
CVE-2014-125122
Description
A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker can overwrite memory in a controlled manner, enabling them to temporarily reset the administrator password of the device to a blank value. This grants unauthorized access to the router’s web management interface without requiring valid credentials.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/admin/http/linksys_tmunblock_admin_reset_bof.rbnvd
- web.archive.org/web/20210424073058/http://www.devttys0.com/2014/02/wrt120n-fprintf-stack-overflow/nvd
- www.exploit-db.com/exploits/31758nvd
- www.vulncheck.com/advisories/linksys-wrt120n-stack-based-buffer-overflow-admin-password-resetnvd
News mentions
0No linked articles in our index yet.