First published: Thu Aug 13 2015(Updated: )
Belkin N300 Dual-Band Wi-Fi Range Extender with firmware before 1.04.10 allows remote authenticated users to execute arbitrary commands via the (1) sub_dir parameter in a formUSBStorage request; pinCode parameter in a (2) formWpsStart or (3) formiNICWpsStart request; (4) wps_enrolee_pin parameter in a formWlanSetupWPS request; or unspecified parameters in a (5) formWlanMP, (6) formBSSetSitesurvey, (7) formHwSet, or (8) formConnectionSetting request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Belkin N300 Dual-band Wi-fi Range Extender Firmware | =1.0.0 | |
Belkin N300 Dual-Band Wi-Fi Range Extender |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5536 is classified with a critical severity level due to the potential for remote code execution.
To fix CVE-2015-5536, update the Belkin N300 Dual-Band Wi-Fi Range Extender firmware to version 1.04.10 or later.
CVE-2015-5536 affects users with the Belkin N300 Dual-Band Wi-Fi Range Extender running firmware versions before 1.04.10.
CVE-2015-5536 allows remote authenticated users to execute arbitrary commands, potentially compromising the device.
If your Belkin N300 Dual-Band Wi-Fi Range Extender is running firmware version prior to 1.04.10, it is vulnerable to CVE-2015-5536.