The web interface to the Belkin Wireless G router and ADSL2 modem F5D7632-4V6 with firmware 6.01.08 allows remote attackers to bypass authentication and gain administrator privileges via a direct request to (1) statusprocess.exe, (2) system_all.exe, or (3) restore.exe in cgi-bin/. NOTE: the setup_dns.exe vector is already covered by CVE-2008-1244.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/31665 - Vendor Advisory | |
References | () http://www.securitytracker.com/id?1020747 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44874 - | |
References | () https://www.exploit-db.com/exploits/6305 - |
Information
Published : 2009-08-28 15:30
Updated : 2024-11-21 00:58
NVD link : CVE-2008-7115
Mitre link : CVE-2008-7115
CVE.ORG link : CVE-2008-7115
JSON object : View
Products Affected
belkin
- wireless_g_router
- f5d7632-4
CWE
CWE-264
Permissions, Privileges, and Access Controls