A vulnerability was found in Belkin F9K1009 and F9K1010 2.00.04/2.00.09 and classified as critical. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to hard-coded credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
Link | Tags |
---|---|
https://vuldb.com/?id.319226 | vdb entry |
https://vuldb.com/?ctiid.319226 | signature permissions required |
https://vuldb.com/?submit.621747 | third party advisory |
https://vuldb.com/?submit.621748 | third party advisory |
https://vuldb.com/?submit.621760 | third party advisory |
https://github.com/Nicholas-wei/bug-discovery/blob/main/belkin/F9K1009_WW_2.00.09/belkin%20F9K1009_WW_2.00.09_hardcoded_credential.pdf | related |
https://github.com/Nicholas-wei/bug-discovery/blob/main/belkin/F9K1010_WW_2.00.04/belkin_F9K1010_WW_2.00.04_hardcoded_credential.pdf | exploit |