The web interface to the Belkin Wireless G router and ADSL2 modem F5D7632-4V6 with firmware 6.01.08 allows remote attackers to bypass authentication and gain administrator privileges via a direct request to (1) statusprocess.exe, (2) system_all.exe, or (3) restore.exe in cgi-bin/.  NOTE: the setup_dns.exe vector is already covered by CVE-2008-1244.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 00:58
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://secunia.com/advisories/31665 - Vendor Advisory | |
| References | () http://www.securitytracker.com/id?1020747 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44874 - | |
| References | () https://www.exploit-db.com/exploits/6305 - | 
Information
                Published : 2009-08-28 15:30
Updated : 2025-04-09 00:30
NVD link : CVE-2008-7115
Mitre link : CVE-2008-7115
CVE.ORG link : CVE-2008-7115
JSON object : View
Products Affected
                belkin
- wireless_g_router
 - f5d7632-4
 
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
