### [CVE-2007-5474](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5474) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The driver for the Linksys WRT350N Wi-Fi access point with firmware 2.00.17 on the Atheros AR5416-AC1E chipset does not properly parse the Atheros vendor-specific information element in an association request, which allows remote authenticated users to cause a denial of service (device reboot or hang) or possibly execute arbitrary code via an Atheros information element with an invalid length, as demonstrated by an element that is too long. ### POC #### Reference - http://securityreason.com/securityalert/4226 #### Github - https://github.com/0xd012/wifuzzit - https://github.com/84KaliPleXon3/wifuzzit - https://github.com/HectorTa1989/802.11-Wireless-Fuzzer - https://github.com/PleXone2019/wifuzzit - https://github.com/flowerhack/wifuzzit - https://github.com/sececter/wifuzzit