Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Belkin Subscribe
Total 54 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2013-3092 1 Belkin 2 N300, N300 Firmware 2014-09-30 8.3 HIGH N/A
The Belkin N300 (F7D7301v1) router allows remote attackers to bypass authentication and gain privileges via vectors related to incorrect validation of the HTTP Authorization header.
CVE-2013-3086 1 Belkin 2 N900, N900 Firmware 2014-09-30 6.8 MEDIUM N/A
Cross-site request forgery (CSRF) vulnerability in util_system.html in Belkin N900 router allows remote attackers to hijack the authentication of administrators for requests that change configuration settings including passwords and remote management ports.
CVE-2013-3089 1 Belkin 2 N300, N300 Firmware 2014-09-30 6.8 MEDIUM N/A
Cross-site request forgery (CSRF) vulnerability in apply.cgi in Belkin N300 (F7D7301v1) router allows remote attackers to hijack the authentication of administrators for requests that modify configuration.
CVE-2013-6949 1 Belkin 1 Wemo Home Automation Firmware 2014-03-05 9.3 HIGH N/A
The Belkin WeMo Home Automation firmware before 3949 does not properly use the STUN and TURN protocols, which allows remote attackers to hijack connections and possibly have unspecified other impact by leveraging access to a single WeMo device.
CVE-2013-6952 1 Belkin 1 Wemo Home Automation Firmware 2014-03-05 10.0 HIGH N/A
The Belkin WeMo Home Automation firmware before 3949 has a hardcoded GPG key, which makes it easier for remote attackers to spoof firmware updates and execute arbitrary code via crafted signed data.
CVE-2013-6948 1 Belkin 1 Wemo Home Automation Firmware 2014-03-05 7.8 HIGH N/A
The peerAddresses API in the Belkin WeMo Home Automation firmware before 3949 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
CVE-2013-6950 1 Belkin 1 Wemo Home Automation Firmware 2014-03-05 7.8 HIGH N/A
The Belkin WeMo Home Automation firmware before 3949 does not use SSL for the distribution feed, which allows man-in-the-middle attackers to install arbitrary firmware by spoofing a distribution server.
CVE-2013-6951 1 Belkin 1 Wemo Home Automation Firmware 2014-02-24 7.1 HIGH N/A
The Belkin WeMo Home Automation firmware before 3949 does not maintain a set of Certification Authority public keys, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary X.509 certificate.
CVE-2012-6371 1 Belkin 1 N900 Wireless Router 2013-01-02 3.3 LOW N/A
The WPA2 implementation on the Belkin N900 F9K1104v1 router establishes a WPS PIN based on 6 digits of the LAN/WLAN MAC address, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading broadcast packets, a different vulnerability than CVE-2012-4366.
CVE-2005-0835 1 Belkin 1 54g Wireless Router 2008-09-05 5.0 MEDIUM N/A
The SNMP service in the Belkin 54G (F5D7130) wireless router allows remote attackers to cause a denial of service via unknown vectors.
CVE-2005-0834 1 Belkin 1 Belkin 54g Wireless Router 2008-09-05 5.0 MEDIUM N/A
Belkin 54G (F5D7130) wireless router enables SNMP by default in a manner that allows remote attackers to obtain sensitive information.
CVE-2005-0833 1 Belkin 1 Belkin 54g Wireless Router 2008-09-05 7.5 HIGH N/A
Belkin 54G (F5D7130) wireless router allows remote attackers to access restricted resources by sniffing URIs from UPNP datagrams, then accessing those URIs, which do not require authentication.
CVE-2002-1811 1 Belkin 1 F5d6130 Wnap 2008-09-05 5.0 MEDIUM N/A
Belkin F5D6130 Wireless Network Access Point running firmware AP14G8 allows remote attackers to cause a denial of service (connection loss) by sending several SNMP GetNextRequest requests.
CVE-2002-1431 1 Belkin 1 F5d5230-4 4-port Cable Dsl Gateway Router 2008-09-05 7.5 HIGH N/A
Belkin F5D5230-4 4-Port Cable/DSL Gateway Router 1.20.000 modifies the source IP address of internal packets to that of the router's external interface when forwarding a request from an internal host to an internal web server, which allows remote attackers to hide which host is being used to access the web server.