Advisory Details

July 20th, 2015

Belkin N300 Dual-Band Wi-Fi Range Extender formConnectionSetting Remote Code Execution Vulnerability

ZDI-15-346
ZDI-CAN-2635

CVE ID CVE-2015-5536
CVSS SCORE 9.0, AV:N/AC:L/Au:S/C:C/I:C/A:C
AFFECTED VENDORS Belkin
AFFECTED PRODUCTS N300 Dual-Band Wi-Fi Range Extender
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['17170']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Belkin N300 Dual-Band Wi-Fi Range Extender. Authentication is required to exploit this vulnerability.

The specific flaw exists within the handling of formConnectionSetting requests. It is possible to inject arbitrary operating system commands when the application is handling several of the request's parameters. A remote attacker can leverage this vulnerability to execute remote code under the context of the root user.

ADDITIONAL DETAILS Belkin has issued an update to correct this vulnerability. More details can be found at:
http://www.belkin.com/us/support-article?articleNum=4975
DISCLOSURE TIMELINE
  • 2014-11-26 - Vulnerability reported to vendor
  • 2015-07-20 - Coordinated public release of advisory
CREDIT Elvis Collado of HP DVLabs
BACK TO ADVISORIES