Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
belkin vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-6949
The Belkin WeMo Home Automation firmware prior to 3949 does not properly use the STUN and TURN protocols, which allows remote malicious users to hijack connections and possibly have unspecified other impact by leveraging access to a single WeMo device.
Belkin Wemo Home Automation Firmware 2769
7.5
CVSSv3
CVE-2019-17532
An issue exists on Belkin Wemo Switch 28B WW_2.00.11057.PVT-OWRT-SNS devices. They allow remote malicious users to cause a denial of service (persistent rules-processing outage) via a crafted ruleDbBody element in a StoreRules request to the upnp/control/rules1 URI, because datab...
Belkin Wemo Switch 28b Firmware Wemo Ww 2.00.11057.pvt-owrt-sns
2 Github repositories
8.6
CVSSv3
CVE-2015-5987
Belkin F9K1102 2 devices with firmware 2.10.17 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote malicious users to spoof responses by predicting this value.
Belkin N600 Db Wi-fi Dual-band N\\\\\\+ Router F9k1102 Firmware 2.10.17
1 Article
NA
CVE-2002-1431
Belkin F5D5230-4 4-Port Cable/DSL Gateway Router 1.20.000 modifies the source IP address of internal packets to that of the router's external interface when forwarding a request from an internal host to an internal web server, which allows remote malicious users to hide whic...
Belkin F5d5230-4 4-port Cable Dsl Gateway Router 1.20.000
NA
CVE-2005-4417
The default configuration of Widcomm Bluetooth for Windows (BTW) 4.0.1.1500 and previous versions, as installed on Belkin Bluetooth Software 1.4.2 Build 10 and ANYCOM Blue USB-130-250 Software 4.0.1.1500, and possibly other devices, sets null Authentication and Authorization valu...
Belkin Bluetooth Software 1.4.2 Build 10
Widcomm Bluetooth For Windows 4.0.1.1500
Anycom Blue Usb-130-250 Software 4.0.1.1500
1 EDB exploit
NA
CVE-2012-2765
Belkin F5D7234-4 v5 G Wireless Router - Remote Hash Exposed
2 EDB exploits
NA
CVE-2005-0834
Belkin 54G (F5D7130) wireless router enables SNMP by default in a manner that allows remote malicious users to obtain sensitive information.
9.8
CVSSv3
CVE-2019-16340
Belkin Linksys Velop 1.1.8.192419 devices allows remote malicious users to discover the recovery key via a direct request for the /sysinfo_json.cgi URI.
Linksys Velop Whw0303 Firmware 1.1.8.192419
Linksys Velop Whw0302 Firmware 1.1.8.192419
Linksys Velop Whw0301 Firmware 1.1.8.192419
8.8
CVSSv3
CVE-2020-35715
Belkin LINKSYS RE6500 devices prior to 1.0.012.001 allow remote authenticated users to execute arbitrary commands via shell metacharacters in a filename to the upload_settings.cgi page.
Linksys Re6500 Firmware
8.8
CVSSv3
CVE-2020-35714
Belkin LINKSYS RE6500 devices prior to 1.0.11.001 allow remote authenticated users to execute arbitrary commands via goform/systemCommand?command= in conjunction with the goform/pingstart program.
Linksys Re6500 Firmware
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »