Soumettre #621748: belkin F9K1010 F9K1010_WW_2.00.04 Use of Hard-coded Passwordinformation

Titrebelkin F9K1010 F9K1010_WW_2.00.04 Use of Hard-coded Password
DescriptionIn belkin F9K1010_WW_2.00.04, hard-coded credential on the Web Interface allows anyone to log in to the firmware directly to perform administrative functions. Malicious attacker can reverse the firmware and use hard-coded credential with username '00E0A6-111' and password '00E0A6-111' for authentication.
La source⚠️ https://github.com/Nicholas-wei/bug-discovery/blob/main/belkin/F9K1010_WW_2.00.04/belkin_F9K1010_WW_2.00.04_hardcoded_credential.pdf
Utilisateur nich0las (UID 51709)
Soumission24/07/2025 07:29 (il y a 9 mois)
Modérer08/08/2025 09:40 (15 days later)
StatutDupliqué
Entrée VulDB319226 [Belkin F9K1009/F9K1010 2.00.04/2.00.09 Web Interface authentification faible]
Points0

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!