ID

VAR-201801-1871


TITLE

(0Day) Belkin Wemo Link and Smart Plug UPNP changeFriendlyName Buffer Overflow Denial of Service Vulnerability

Trust: 0.7

sources: ZDI: ZDI-18-134

DESCRIPTION

This vulnerability allows attackers on the local network to create a denial-of-service condition on the Belkin Wemo Link and Smart Plug device, despite factory resets. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of XML parsing in the UPNP service. When parsing changeFriendlyName requests, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to trigger an infinite reboot loop and deny service to users of the device.

Trust: 0.7

sources: ZDI: ZDI-18-134

AFFECTED PRODUCTS

vendor:belkinmodel:wemo linkscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-18-134

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: ZDI-18-134
value: MEDIUM

Trust: 0.7

ZDI: ZDI-18-134
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

sources: ZDI: ZDI-18-134

EXTERNAL IDS

db:ZDI_CANid:ZDI-CAN-5206

Trust: 0.7

db:ZDIid:ZDI-18-134

Trust: 0.7

sources: ZDI: ZDI-18-134

CREDITS

Dove Chiu of Trend Micro

Trust: 0.7

sources: ZDI: ZDI-18-134

SOURCES

db:ZDIid:ZDI-18-134

LAST UPDATE DATE

2022-05-17T02:02:25.106000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-18-134date:2018-01-23T00:00:00

SOURCES RELEASE DATE

db:ZDIid:ZDI-18-134date:2018-01-23T00:00:00