### [CVE-2014-8244](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8244) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote attackers to obtain sensitive information or modify data via a JNAP action in a JNAP/ HTTP request. ### POC #### Reference - http://www.kb.cert.org/vuls/id/447516 #### Github - https://github.com/JollyJumbuckk/LinksysLeaks - https://github.com/zeropwn/vulnerability-reports-and-pocs