Belkin N300 Dual-Band Wi-Fi Range Extender with firmware before 1.04.10 allows remote authenticated users to execute arbitrary commands via the (1) sub_dir parameter in a formUSBStorage request; pinCode parameter in a (2) formWpsStart or (3) formiNICWpsStart request; (4) wps_enrolee_pin parameter in a formWlanSetupWPS request; or unspecified parameters in a (5) formWlanMP, (6) formBSSetSitesurvey, (7) formHwSet, or (8) formConnectionSetting request.
Credit:
The information has been provided by Elvis Collado of HP DVLabs.
Vulnerable Systems:
* Belkin N300 Dual-Band Wi-Fi Range Extender with firmware before 1.04.10
Immune Systems:
* Belkin N300 Dual-Band Wi-Fi Range Extender with firmware after 1.04.10
Belkin N300 Dual-Band Wi-Fi Range Extender is prone to multiple remote code-execution vulnerabilities. Attackers can exploit these issues to execute arbitrary code within the context of the affected device. Failed exploit attempts may result in denial-of-service conditions.