Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Belkin N150 path traversal vulnerability
Informations
Name VU#774788 First vendor Publication 2014-06-18
Vendor VU-CERT Last vendor Modification 2014-06-18
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:N/A:N)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#774788

Belkin N150 path traversal vulnerability

Original Release date: 18 Jun 2014 | Last revised: 18 Jun 2014

Overview

Belkin N150 wireless routers contain a path traversal vulnerability.

Description

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - CVE-2014-2962

Belkin N150 wireless router firmware versions 1.00.07 and earlier contain a path traversal vulnerability through the built-in web interface. The webproc cgi module accepts a getpage parameter which takes an unrestricted file path as input. The web server runs with root privileges by default, allowing a malicious attacker to read any file on the system.

Impact

An unauthenticated attacker that is connected to the router's LAN may be able to read critical system files on the router.

Solution

Belkin advises users to upgrade to firmware version 1.00.08. In addition, the following workaround is available:

Restrict Access

Ensure that appropriate firewall rules are in place to restrict access to port 80/tcp from external untrusted sources.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Belkin, Inc.Affected10 Mar 201409 Jun 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base7.8AV:N/AC:L/Au:N/C:C/I:--/A:--
Temporal6.1E:POC/RL:OF/RC:C
Environmental4.6CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

  • http://www.belkin.com/us/support-article?articleNum=109400
  • http://cwe.mitre.org/data/definitions/22.html

Credit

Thanks to Aditya Lad for reporting this vulnerability.

This document was written by Todd Lewellen.

Other Information

  • CVE IDs:CVE-2014-2962
  • Date Public:18 Jun 2014
  • Date First Published:18 Jun 2014
  • Date Last Updated:18 Jun 2014
  • Document Revision:13

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/774788

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 1
Os 2

Snort® IPS/IDS

Date Description
2019-09-10 Belkin N150 abitrary file read attempt
RuleID : 50917 - Revision : 1 - Type : SERVER-WEBAPP
2019-09-10 Belkin N150 abitrary file read attempt
RuleID : 50916 - Revision : 1 - Type : SERVER-WEBAPP
2019-09-10 Belkin N150 abitrary file read attempt
RuleID : 50915 - Revision : 1 - Type : SERVER-WEBAPP
2017-07-25 Belkin N150 abitrary file read attempt
RuleID : 43299 - Revision : 2 - Type : SERVER-WEBAPP

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-07-25 13:18:52
  • Multiple Updates
2014-06-20 05:28:36
  • Multiple Updates
2014-06-19 17:27:08
  • Multiple Updates
2014-06-18 17:22:03
  • First insertion