- Description
- The web interface to the Belkin Wireless G router and ADSL2 modem F5D7632-4V6 with firmware 6.01.08 allows remote attackers to bypass authentication and gain administrator privileges via a direct request to (1) statusprocess.exe, (2) system_all.exe, or (3) restore.exe in cgi-bin/. NOTE: the setup_dns.exe vector is already covered by CVE-2008-1244.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
- nvd@nist.gov
- CWE-264
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:belkin:f5d7632-4:6.01.08:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7FC84DE7-99D0-42B8-B496-9D8A0C2E6E75"
},
{
"criteria": "cpe:2.3:h:belkin:wireless_g_router:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "62AB0A6E-166C-480B-BE17-0EBA7FB277E1"
}
],
"operator": "OR"
}
]
}
]