CVE-2008-7115

The web interface to the Belkin Wireless G router and ADSL2 modem F5D7632-4V6 with firmware 6.01.08 allows remote attackers to bypass authentication and gain administrator privileges via a direct request to (1) statusprocess.exe, (2) system_all.exe, or (3) restore.exe in cgi-bin/. NOTE: the setup_dns.exe vector is already covered by CVE-2008-1244.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:belkin:f5d7632-4:6.01.08:*:*:*:*:*:*:*
cpe:2.3:h:belkin:wireless_g_router:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:58

Type Values Removed Values Added
References () http://secunia.com/advisories/31665 - Vendor Advisory () http://secunia.com/advisories/31665 - Vendor Advisory
References () http://www.securitytracker.com/id?1020747 - () http://www.securitytracker.com/id?1020747 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44874 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/44874 -
References () https://www.exploit-db.com/exploits/6305 - () https://www.exploit-db.com/exploits/6305 -

Information

Published : 2009-08-28 15:30

Updated : 2024-11-21 00:58


NVD link : CVE-2008-7115

Mitre link : CVE-2008-7115

CVE.ORG link : CVE-2008-7115


JSON object : View

Products Affected

belkin

  • wireless_g_router
  • f5d7632-4
CWE
CWE-264

Permissions, Privileges, and Access Controls