- EPSS 4.23%
- Veröffentlicht 10.03.2008 17:44:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The control panel on the Belkin F5D7230-4 router with firmware 9.01.10 maintains authentication state by IP address, which allows remote attackers to bypass authentication by establishing a session from a source IP address of a previously authenticat...
- EPSS 5.02%
- Veröffentlicht 10.03.2008 17:44:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
cgi-bin/setup_dns.exe on the Belkin F5D7230-4 router with firmware 9.01.10 does not require authentication, which allows remote attackers to perform administrative actions, as demonstrated by changing a DNS server via the dns1_1, dns1_2, dns1_3, and ...
CVE-2008-1245
- EPSS 4.29%
- Veröffentlicht 10.03.2008 17:44:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
cgi-bin/setup_virtualserver.exe on the Belkin F5D7230-4 router with firmware 9.01.10 allows remote attackers to cause a denial of service (control center outage) via an HTTP request with invalid POST data and a "Connection: Keep-Alive" header.
- EPSS 0.6%
- Veröffentlicht 20.11.2007 19:46:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The Belkin F5D7230-4 Wireless G Router allows remote attackers to cause a denial of service (degraded networking and logging) via a flood of TCP SYN packets, a related issue to CVE-1999-0116.
CVE-2005-3802
- EPSS 1.35%
- Veröffentlicht 24.11.2005 11:03:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Belkin F5D7232-4 and F5D7230-4 wireless routers with firmware 4.03.03 and 4.05.03, when a legitimate administrator is logged into the web management interface, allow remote attackers to access the management interface without authentication.