First published: Thu Dec 31 2015(Updated: )
Belkin F9K1102 2 devices with firmware 2.10.17 rely on client-side JavaScript code for authorization, which allows remote attackers to obtain administrative privileges via certain changes to LockStatus and Login_Success values.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel GS1900-10HP firmware | <2.50\(aazi.0\)c0 | |
Zyxel GS1900-10HP firmware | <2.50\(aazi.0\)c0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5989 has been rated as high severity due to the potential for remote attackers to gain unauthorized administrative access.
To fix CVE-2015-5989, update the Belkin F9K1102 firmware to a version that addresses this vulnerability.
CVE-2015-5989 specifically affects the Belkin F9K1102 router running firmware version 2.10.17.
The vulnerability in CVE-2015-5989 arises from reliance on client-side JavaScript for authorization, allowing manipulation of session variables.
Yes, CVE-2015-5989 can be exploited remotely, allowing attackers to gain administrative privileges without physical access.