Belkin wireless router allows administrative access
|belkin-router-default-password (21412)||High Risk|
Belkin belkin54g series wireless routers could allow a remote attacker to gain administrative access caused by a vulnerability regarding a default Telnet backdoor enabled by default on TCP port 23. A remote attacker using Telnet could access the router using an empty password to gain unauthorized administrative access to the targeted device. An attacker could then use this vulnerability to perform administrative actions on the system, such as add user accounts, view the access password for ISP service, browse the filesystem structure, or possibly view sensitive information, stored within the config file.
No remedy available as of May 1, 2013.
- Belkin Web site: Belkin Corporation - Global Home Page.
- BugTraq Mailing List, 2005-07-15 8:14:14: several vulnerabilities present in Belkin wireless routers.
- CVE-2005-2374: Belkin 54g wireless routers do not properly set an administrative password, which allows remote attackers to gain access via the (1) Telnet or (2) weba dministration interfaces.
- OSVDB ID: 18293: Belkin 54G Routers Admin Account Default Null Password
- SECTRACK ID: 1014493: Belkin Wireless Router Grants Administrative Access to Remote Users
- Belkin F5D7230-4
- Belkin F5D7232-4
Jul 15, 2005
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this