First published: Fri Aug 28 2009(Updated: )
The web interface to the Belkin Wireless G router and ADSL2 modem F5D7632-4V6 with firmware 6.01.08 allows remote attackers to bypass authentication and gain administrator privileges via a direct request to (1) statusprocess.exe, (2) system_all.exe, or (3) restore.exe in cgi-bin/. NOTE: the setup_dns.exe vector is already covered by CVE-2008-1244.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Belkin Wireless G Router | ||
Belkin F5D7632-4 | =6.01.08 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-7115 is considered a high severity vulnerability due to its ability to allow remote attackers to bypass authentication and gain unauthorized access.
To fix CVE-2008-7115, update the firmware of your Belkin Wireless G router to the latest version if available or disable remote management features.
CVE-2008-7115 affects Belkin Wireless G routers and ADSL2 modems, specifically the F5D7632-4 model with firmware version 6.01.08.
Attackers exploiting CVE-2008-7115 can gain administrator privileges and control the router, potentially compromising the network.
As a temporary workaround for CVE-2008-7115, you can restrict access to the router’s web interface by implementing IP address filtering or disabling external access.