Filtered by vendor Belkin
Subscribe
Total
54 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2013-3092 | 1 Belkin | 2 N300, N300 Firmware | 2014-09-30 | 8.3 HIGH | N/A |
The Belkin N300 (F7D7301v1) router allows remote attackers to bypass authentication and gain privileges via vectors related to incorrect validation of the HTTP Authorization header. | |||||
CVE-2013-3086 | 1 Belkin | 2 N900, N900 Firmware | 2014-09-30 | 6.8 MEDIUM | N/A |
Cross-site request forgery (CSRF) vulnerability in util_system.html in Belkin N900 router allows remote attackers to hijack the authentication of administrators for requests that change configuration settings including passwords and remote management ports. | |||||
CVE-2013-3089 | 1 Belkin | 2 N300, N300 Firmware | 2014-09-30 | 6.8 MEDIUM | N/A |
Cross-site request forgery (CSRF) vulnerability in apply.cgi in Belkin N300 (F7D7301v1) router allows remote attackers to hijack the authentication of administrators for requests that modify configuration. | |||||
CVE-2013-6949 | 1 Belkin | 1 Wemo Home Automation Firmware | 2014-03-05 | 9.3 HIGH | N/A |
The Belkin WeMo Home Automation firmware before 3949 does not properly use the STUN and TURN protocols, which allows remote attackers to hijack connections and possibly have unspecified other impact by leveraging access to a single WeMo device. | |||||
CVE-2013-6952 | 1 Belkin | 1 Wemo Home Automation Firmware | 2014-03-05 | 10.0 HIGH | N/A |
The Belkin WeMo Home Automation firmware before 3949 has a hardcoded GPG key, which makes it easier for remote attackers to spoof firmware updates and execute arbitrary code via crafted signed data. | |||||
CVE-2013-6948 | 1 Belkin | 1 Wemo Home Automation Firmware | 2014-03-05 | 7.8 HIGH | N/A |
The peerAddresses API in the Belkin WeMo Home Automation firmware before 3949 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | |||||
CVE-2013-6950 | 1 Belkin | 1 Wemo Home Automation Firmware | 2014-03-05 | 7.8 HIGH | N/A |
The Belkin WeMo Home Automation firmware before 3949 does not use SSL for the distribution feed, which allows man-in-the-middle attackers to install arbitrary firmware by spoofing a distribution server. | |||||
CVE-2013-6951 | 1 Belkin | 1 Wemo Home Automation Firmware | 2014-02-24 | 7.1 HIGH | N/A |
The Belkin WeMo Home Automation firmware before 3949 does not maintain a set of Certification Authority public keys, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary X.509 certificate. | |||||
CVE-2012-6371 | 1 Belkin | 1 N900 Wireless Router | 2013-01-02 | 3.3 LOW | N/A |
The WPA2 implementation on the Belkin N900 F9K1104v1 router establishes a WPS PIN based on 6 digits of the LAN/WLAN MAC address, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading broadcast packets, a different vulnerability than CVE-2012-4366. | |||||
CVE-2005-0835 | 1 Belkin | 1 54g Wireless Router | 2008-09-05 | 5.0 MEDIUM | N/A |
The SNMP service in the Belkin 54G (F5D7130) wireless router allows remote attackers to cause a denial of service via unknown vectors. | |||||
CVE-2005-0834 | 1 Belkin | 1 Belkin 54g Wireless Router | 2008-09-05 | 5.0 MEDIUM | N/A |
Belkin 54G (F5D7130) wireless router enables SNMP by default in a manner that allows remote attackers to obtain sensitive information. | |||||
CVE-2005-0833 | 1 Belkin | 1 Belkin 54g Wireless Router | 2008-09-05 | 7.5 HIGH | N/A |
Belkin 54G (F5D7130) wireless router allows remote attackers to access restricted resources by sniffing URIs from UPNP datagrams, then accessing those URIs, which do not require authentication. | |||||
CVE-2002-1811 | 1 Belkin | 1 F5d6130 Wnap | 2008-09-05 | 5.0 MEDIUM | N/A |
Belkin F5D6130 Wireless Network Access Point running firmware AP14G8 allows remote attackers to cause a denial of service (connection loss) by sending several SNMP GetNextRequest requests. | |||||
CVE-2002-1431 | 1 Belkin | 1 F5d5230-4 4-port Cable Dsl Gateway Router | 2008-09-05 | 7.5 HIGH | N/A |
Belkin F5D5230-4 4-Port Cable/DSL Gateway Router 1.20.000 modifies the source IP address of internal packets to that of the router's external interface when forwarding a request from an internal host to an internal web server, which allows remote attackers to hide which host is being used to access the web server. |