Vulnerability Description
The web interface to the Belkin Wireless G router and ADSL2 modem F5D7632-4V6 with firmware 6.01.08 allows remote attackers to bypass authentication and gain administrator privileges via a direct request to (1) statusprocess.exe, (2) system_all.exe, or (3) restore.exe in cgi-bin/. NOTE: the setup_dns.exe vector is already covered by CVE-2008-1244.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Belkin | F5D7632-4 | 6.01.08 |
| Belkin | Wireless G Router | All versions |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/31665Vendor Advisory
- http://www.securitytracker.com/id?1020747
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44874
- https://www.exploit-db.com/exploits/6305
- http://secunia.com/advisories/31665Vendor Advisory
- http://www.securitytracker.com/id?1020747
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44874
- https://www.exploit-db.com/exploits/6305
FAQ
What is CVE-2008-7115?
CVE-2008-7115 is a vulnerability with a CVSS score of 10.0 (HIGH). The web interface to the Belkin Wireless G router and ADSL2 modem F5D7632-4V6 with firmware 6.01.08 allows remote attackers to bypass authentication and gain administrator privileges via a direct requ...
How severe is CVE-2008-7115?
CVE-2008-7115 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-7115?
Check the references section above for vendor advisories and patch information. Affected products include: Belkin F5D7632-4, Belkin Wireless G Router.