what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

belkinVuln.txt

belkinVuln.txt
Posted Nov 20, 2005
Authored by Andrei Mikhailovsky | Site arhont.com

A serious security vulnerability have been found in authentication system of Belkin Wireless Routers. The vulnerability has been confirmed in Belkin Wireless Routers models F5D7232-4 and F5D7230-4 with latest firmware 4.05.03 and with firmware 4.03.03. Previous firmware versions are also likely to be effected. Other Belkin wireless devices are likely to be vulnerable.

tags | advisory
SHA-256 | 98f635054633bca917f22e9458132c65582acf61c13b8d3338113d4c51434170

belkinVuln.txt

Change Mirror Download
Arhont Ltd. - Information Security

Arhont Advisory by: Andrei Mikhailovsky (www.arhont.com)
Advisory: Belkin Wireless Router Authentication
Vulnerability
Router Model Name: F5D7232-4 and F5D7230-4
Model Specific: Other models are likely to be vulnerable
Manufacturer site: http://www.belkin.com


SUMMARY:
A serious security vulnerability have been found in authentication
system of Belkin Wireless Routers. The vulnerability has been confirmed
in Belkin Wireless Routers models F5D7232-4 and F5D7230-4 with latest
firmware 4.05.03 and with firmware 4.03.03. Previous firmware versions
are also likely to be effected. Other Belkin wireless devices are likely
to be vulnerable.


VULNERABILITY DESCRIPTION:
While a legitimate device administrator is logged into the router's web
management interface, any other user/attacker can access, view and
change router's web configuration without authentication from any
network address. This presents an opportunistic vector of attack on the
device in question.


Risk Factor: High/Medium


WORKAROUNDS: At the release time of this advisory, Belkin didn't have
an update that solves the issue. It is advised to filter all requests to
web administration interface of the device.


COMMUNICATION HISTORY:
Manufacturer notified on 11th of October 2005


ADDITIONAL INFORMATION:
*According to the Arhont Ltd. policy, all of the found vulnerabilities
and security issues will be reported to the manufacturer at least 7 days
before releasing them to the public domains (such as CERT and BUGTRAQ).
The delay of the public release might be negotiated with the
manufacturer providing reasonable justifications have been given from
the manufacturer side.

If you would like to get more information about this issue, please do
not hesitate to contact Arhont team on info[_-at-_]arhont[_-dot-_]com


--
Andrei Mikhailovsky
Arhont Ltd - Information Security

Web: http://www.arhont.com
http://www.wi-foo.com
Tel: +44 (0)870 4431337
Fax: +44 (0)117 9690141
PGP: Key ID - 0x2B3438DE
PGP: Server - keyserver.pgp.com
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close