Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
belkin vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2013-6948
The peerAddresses API in the Belkin WeMo Home Automation firmware prior to 3949 allows remote malicious users to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) iss...
Belkin Wemo Home Automation Firmware 2769
7.1
CVSSv2
CVE-2013-6951
The Belkin WeMo Home Automation firmware prior to 3949 does not maintain a set of Certification Authority public keys, which allows man-in-the-middle malicious users to spoof SSL servers via an arbitrary X.509 certificate.
Belkin Wemo Home Automation Firmware 2769
7.8
CVSSv2
CVE-2019-17532
An issue exists on Belkin Wemo Switch 28B WW_2.00.11057.PVT-OWRT-SNS devices. They allow remote malicious users to cause a denial of service (persistent rules-processing outage) via a crafted ruleDbBody element in a StoreRules request to the upnp/control/rules1 URI, because datab...
Belkin Wemo Switch 28b Firmware Wemo Ww 2.00.11057.pvt-owrt-sns
2 Github repositories
7.5
CVSSv2
CVE-2002-1431
Belkin F5D5230-4 4-Port Cable/DSL Gateway Router 1.20.000 modifies the source IP address of internal packets to that of the router's external interface when forwarding a request from an internal host to an internal web server, which allows remote malicious users to hide whic...
Belkin F5d5230-4 4-port Cable Dsl Gateway Router 1.20.000
6.4
CVSSv2
CVE-2005-4417
The default configuration of Widcomm Bluetooth for Windows (BTW) 4.0.1.1500 and previous versions, as installed on Belkin Bluetooth Software 1.4.2 Build 10 and ANYCOM Blue USB-130-250 Software 4.0.1.1500, and possibly other devices, sets null Authentication and Authorization valu...
Belkin Bluetooth Software 1.4.2 Build 10
Widcomm Bluetooth For Windows 4.0.1.1500
Anycom Blue Usb-130-250 Software 4.0.1.1500
1 EDB exploit
NA
CVE-2012-2765
Belkin F5D7234-4 v5 G Wireless Router - Remote Hash Exposed
2 EDB exploits
5
CVSSv2
CVE-2005-0834
Belkin 54G (F5D7130) wireless router enables SNMP by default in a manner that allows remote malicious users to obtain sensitive information.
6.4
CVSSv2
CVE-2019-16340
Belkin Linksys Velop 1.1.8.192419 devices allows remote malicious users to discover the recovery key via a direct request for the /sysinfo_json.cgi URI.
Linksys Velop Whw0303 Firmware 1.1.8.192419
Linksys Velop Whw0302 Firmware 1.1.8.192419
Linksys Velop Whw0301 Firmware 1.1.8.192419
9
CVSSv2
CVE-2020-35715
Belkin LINKSYS RE6500 devices prior to 1.0.012.001 allow remote authenticated users to execute arbitrary commands via shell metacharacters in a filename to the upload_settings.cgi page.
Linksys Re6500 Firmware
6.5
CVSSv2
CVE-2020-35714
Belkin LINKSYS RE6500 devices prior to 1.0.11.001 allow remote authenticated users to execute arbitrary commands via goform/systemCommand?command= in conjunction with the goform/pingstart program.
Linksys Re6500 Firmware
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
XXE
CVE-2024-34490
SQL injection
CVE-2024-34488
CVE-2024-4507
CVE-2023-7028
CVE-2024-23187
TCP
CVE-2024-4439
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »