ID

VAR-200801-0089


CVE

CVE-2008-0403


TITLE

Belkin Wireless G Plus MIMO Router F5D9230-4 of Web Server configuration change vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2008-002640

DESCRIPTION

The web server in Belkin Wireless G Plus MIMO Router F5D9230-4 does not require authentication for SaveCfgFile.cgi, which allows remote attackers to read and modify configuration via a direct request to SaveCfgFile.cgi. Successful exploits will allow unauthorized attackers to gain access to administrative functionality and completely compromise vulnerable devices; other attacks are also possible. The issue affects firmware version 3.01.53; other versions may also be vulnerable. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. The vulnerability is caused due to missing authentication checks when accessing the SaveCfgFile.cgi script, which can be exploited to disclose sensitive information like the router's password. Note: If remote management is enabled, this can also be exploited from people outside the local network. SOLUTION: Restrict access to the device or use it in trusted network environments only. Reportedly, the vendor is working on a fix. A fixed beta version should be available soon, a final version is planned to be released before end of February. PROVIDED AND/OR DISCOVERED BY: DarkFig ORIGINAL ADVISORY: http://milw0rm.com/exploits/4941 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-0403 // JVNDB: JVNDB-2008-002640 // BID: 27359 // VULHUB: VHN-30528 // PACKETSTORM: 63292

AFFECTED PRODUCTS

vendor:belkinmodel:f5d9230-4scope: - version: -

Trust: 1.4

vendor:belkinmodel:f5d9230-4scope:eqversion:*

Trust: 1.0

vendor:belkinmodel:f5d9230-4scope:eqversion:0

Trust: 0.3

sources: BID: 27359 // JVNDB: JVNDB-2008-002640 // CNNVD: CNNVD-200801-352 // NVD: CVE-2008-0403

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0403
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-0403
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200801-352
value: MEDIUM

Trust: 0.6

VULHUB: VHN-30528
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-0403
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-30528
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-30528 // JVNDB: JVNDB-2008-002640 // CNNVD: CNNVD-200801-352 // NVD: CVE-2008-0403

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-30528 // JVNDB: JVNDB-2008-002640 // NVD: CVE-2008-0403

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200801-352

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-200801-352

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-002640

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-30528

PATCH

title:Top Pageurl:http://www.belkin.com/

Trust: 0.8

sources: JVNDB: JVNDB-2008-002640

EXTERNAL IDS

db:NVDid:CVE-2008-0403

Trust: 2.8

db:BIDid:27359

Trust: 2.0

db:SECUNIAid:28554

Trust: 1.9

db:EXPLOIT-DBid:4941

Trust: 1.8

db:SREASONid:3566

Trust: 1.7

db:VUPENid:ADV-2008-0215

Trust: 1.7

db:JVNDBid:JVNDB-2008-002640

Trust: 0.8

db:MILW0RMid:4941

Trust: 0.6

db:BUGTRAQid:20080119 BELKIN WIRELESS G PLUS MIMO ROUTER F5D9230-4 AUTHENTICATION BYPASS VULNERABILITY

Trust: 0.6

db:XFid:39793

Trust: 0.6

db:CNNVDid:CNNVD-200801-352

Trust: 0.6

db:VULHUBid:VHN-30528

Trust: 0.1

db:PACKETSTORMid:63292

Trust: 0.1

sources: VULHUB: VHN-30528 // BID: 27359 // JVNDB: JVNDB-2008-002640 // PACKETSTORM: 63292 // CNNVD: CNNVD-200801-352 // NVD: CVE-2008-0403

REFERENCES

url:http://www.securityfocus.com/bid/27359

Trust: 1.7

url:http://secunia.com/advisories/28554

Trust: 1.7

url:http://securityreason.com/securityalert/3566

Trust: 1.7

url:http://www.securityfocus.com/archive/1/486748/100/0/threaded

Trust: 1.1

url:https://www.exploit-db.com/exploits/4941

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/0215

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/39793

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0403

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0403

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/39793

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/486748/100/0/threaded

Trust: 0.6

url:http://www.milw0rm.com/exploits/4941

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/0215

Trust: 0.6

url:http://catalog.belkin.com/iwcatproductpage.process?product_id=203415

Trust: 0.3

url:/archive/1/486748

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/advisories/28554/

Trust: 0.1

url:http://milw0rm.com/exploits/4941

Trust: 0.1

url:http://secunia.com/product/17458/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-30528 // BID: 27359 // JVNDB: JVNDB-2008-002640 // PACKETSTORM: 63292 // CNNVD: CNNVD-200801-352 // NVD: CVE-2008-0403

CREDITS

DarkFig is credited with the discovery of this issue.

Trust: 0.9

sources: BID: 27359 // CNNVD: CNNVD-200801-352

SOURCES

db:VULHUBid:VHN-30528
db:BIDid:27359
db:JVNDBid:JVNDB-2008-002640
db:PACKETSTORMid:63292
db:CNNVDid:CNNVD-200801-352
db:NVDid:CVE-2008-0403

LAST UPDATE DATE

2025-04-10T23:25:02.594000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-30528date:2018-10-15T00:00:00
db:BIDid:27359date:2015-05-07T17:33:00
db:JVNDBid:JVNDB-2008-002640date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200801-352date:2008-09-05T00:00:00
db:NVDid:CVE-2008-0403date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-30528date:2008-01-23T00:00:00
db:BIDid:27359date:2008-01-21T00:00:00
db:JVNDBid:JVNDB-2008-002640date:2012-06-26T00:00:00
db:PACKETSTORMid:63292date:2008-02-06T00:59:36
db:CNNVDid:CNNVD-200801-352date:2008-01-23T00:00:00
db:NVDid:CVE-2008-0403date:2008-01-23T12:00:00