CVE-2015-5989

Belkin F9K1102 2 devices with firmware 2.10.17 rely on client-side JavaScript code for authorization, which allows remote attackers to obtain administrative privileges via certain changes to LockStatus and Login_Success values.
References
Link Resource
https://www.kb.cert.org/vuls/id/201168 Third Party Advisory US Government Resource
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:belkin:n600_db_wi-fi_dual-band_n\\\+_router_f9k1102_firmware:2.10.17:*:*:*:*:*:*:*
cpe:2.3:h:belkin:n600_db_wi-fi_dual-band_n\\\+_router_f9k1102:2.0:*:*:*:*:*:*:*

Information

Published : 2015-12-31 08:59

Updated : 2015-12-31 12:00


NVD link : CVE-2015-5989

Mitre link : CVE-2015-5989


JSON object : View

CWE
CWE-264

Permissions, Privileges, and Access Controls

Advertisement

dedicated server usa

Products Affected

belkin

  • n600_db_wi-fi_dual-band_n\\\+_router_f9k1102_firmware
  • n600_db_wi-fi_dual-band_n\\\+_router_f9k1102