First published: Fri Aug 28 2009(Updated: )
The web interface to the Belkin Wireless G router and ADSL2 modem F5D7632-4V6 with firmware 6.01.08 allows remote attackers to bypass authentication and gain administrator privileges via a direct request to (1) statusprocess.exe, (2) system_all.exe, or (3) restore.exe in cgi-bin/. NOTE: the setup_dns.exe vector is already covered by CVE-2008-1244.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Belkin Wireless G router | ||
Belkin F5d7632-4 | =6.01.08 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.