Overview
- Description
- The web interface to the Belkin Wireless G router and ADSL2 modem F5D7632-4V6 with firmware 6.01.08 allows remote attackers to bypass authentication and gain administrator privileges via a direct request to (1) statusprocess.exe, (2) system_all.exe, or (3) restore.exe in cgi-bin/. NOTE: the setup_dns.exe vector is already covered by CVE-2008-1244.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:belkin:f5d7632-4:6.01.08:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FC84DE7-99D0-42B8-B496-9D8A0C2E6E75" }, { "criteria": "cpe:2.3:h:belkin:wireless_g_router:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62AB0A6E-166C-480B-BE17-0EBA7FB277E1" } ], "operator": "OR" } ] } ]