Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
belkin vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-0835
The SNMP service in the Belkin 54G (F5D7130) wireless router allows remote malicious users to cause a denial of service via unknown vectors.
Belkin 54g Wireless Router F5d7130
NA
CVE-2012-6371
The WPA2 implementation on the Belkin N900 F9K1104v1 router establishes a WPS PIN based on 6 digits of the LAN/WLAN MAC address, which makes it easier for remote malicious users to obtain access to a Wi-Fi network by reading broadcast packets, a different vulnerability than CVE-2...
Belkin N900 Wireless Router F9k1104v1
1 Github repository
NA
CVE-2015-5536
Belkin N300 Dual-Band Wi-Fi Range Extender with firmware prior to 1.04.10 allows remote authenticated users to execute arbitrary commands via the (1) sub_dir parameter in a formUSBStorage request; pinCode parameter in a (2) formWpsStart or (3) formiNICWpsStart request; (4) wps_en...
Belkin N300 Dual-band Wi-fi Range Extender Firmware 1.0.0
NA
CVE-2013-6951
The Belkin WeMo Home Automation firmware prior to 3949 does not maintain a set of Certification Authority public keys, which allows man-in-the-middle malicious users to spoof SSL servers via an arbitrary X.509 certificate.
Belkin Wemo Home Automation Firmware 2769
9.8
CVSSv3
CVE-2015-5988
The web management interface on Belkin F9K1102 2 devices with firmware 2.10.17 has a blank password, which allows remote malicious users to obtain administrative privileges by leveraging a LAN session.
Belkin N600 Db Wi-fi Dual-band N\\\\\\+ Router F9k1102 Firmware 2.10.17
9.8
CVSSv3
CVE-2015-5989
Belkin F9K1102 2 devices with firmware 2.10.17 rely on client-side JavaScript code for authorization, which allows remote malicious users to obtain administrative privileges via certain changes to LockStatus and Login_Success values.
Belkin N600 Db Wi-fi Dual-band N\\\\\\+ Router F9k1102 Firmware 2.10.17
7.5
CVSSv3
CVE-2019-17532
An issue exists on Belkin Wemo Switch 28B WW_2.00.11057.PVT-OWRT-SNS devices. They allow remote malicious users to cause a denial of service (persistent rules-processing outage) via a crafted ruleDbBody element in a StoreRules request to the upnp/control/rules1 URI, because datab...
Belkin Wemo Switch 28b Firmware Wemo Ww 2.00.11057.pvt-owrt-sns
2 Github repositories
NA
CVE-2013-6948
The peerAddresses API in the Belkin WeMo Home Automation firmware prior to 3949 allows remote malicious users to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) iss...
Belkin Wemo Home Automation Firmware 2769
NA
CVE-2013-6949
The Belkin WeMo Home Automation firmware prior to 3949 does not properly use the STUN and TURN protocols, which allows remote malicious users to hijack connections and possibly have unspecified other impact by leveraging access to a single WeMo device.
Belkin Wemo Home Automation Firmware 2769
NA
CVE-2013-6950
The Belkin WeMo Home Automation firmware prior to 3949 does not use SSL for the distribution feed, which allows man-in-the-middle malicious users to install arbitrary firmware by spoofing a distribution server.
Belkin Wemo Home Automation Firmware 2769
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »