VAR-201409-0055

Vulnerability from variot - Updated: 2025-04-13 23:04

The Belkin N300 (F7D7301v1) router allows remote attackers to bypass authentication and gain privileges via vectors related to incorrect validation of the HTTP Authorization header. Belkin N900 And N300 are prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Belkin N300 (F7D7301v1) Router is a broadband wireless router product of Belkin Company of the United States. There is a security vulnerability in the Belkin N300 (F7D7301v1) Router. The vulnerability is caused by the program not correctly verifying the HTTP Authorization header

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201409-0055",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "n300",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "belkin",
        "version": "1.00.06"
      },
      {
        "model": "n300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "belkin",
        "version": null
      },
      {
        "model": "n300 wi-fi n router",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "belkin",
        "version": "(f7d7301v1)"
      },
      {
        "model": "n900 f9k1104v1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "belkin",
        "version": "1.0.23"
      },
      {
        "model": "n300 f7d7301v1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "belkin",
        "version": "1.00.06"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "59499"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006656"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-588"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3092"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:belkin:n300_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:belkin:n300",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006656"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Jacob Holcomb",
    "sources": [
      {
        "db": "BID",
        "id": "59499"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-588"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2013-3092",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "CVE-2013-3092",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 6.8,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2013-3092",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "VHN-63094",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-3092",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-3092",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201304-588",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-63094",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63094"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006656"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-588"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3092"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Belkin N300 (F7D7301v1) router allows remote attackers to bypass authentication and gain privileges via vectors related to incorrect validation of the HTTP Authorization header. Belkin N900 And N300 are prone to a security-bypass vulnerability. \nAn attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Belkin N300 (F7D7301v1) Router is a broadband wireless router product of Belkin Company of the United States. There is a security vulnerability in the Belkin N300 (F7D7301v1) Router. The vulnerability is caused by the program not correctly verifying the HTTP Authorization header",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-3092"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006656"
      },
      {
        "db": "BID",
        "id": "59499"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63094"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-3092",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "59499",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006656",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-588",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-63094",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63094"
      },
      {
        "db": "BID",
        "id": "59499"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006656"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-588"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3092"
      }
    ]
  },
  "id": "VAR-201409-0055",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63094"
      }
    ],
    "trust": 0.80833335
  },
  "last_update_date": "2025-04-13T23:04:50.411000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "N300 Wi-Fi N Router",
        "trust": 0.8,
        "url": "http://www.belkin.com/us/support-product?pid=01t80000002wBTUAA2"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006656"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63094"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006656"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3092"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://securityevaluators.com/knowledge/case_studies/routers/belkin_n900.php"
      },
      {
        "trust": 1.7,
        "url": "http://securityevaluators.com/knowledge/case_studies/routers/vulnerability_catalog.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3092"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3092"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/59499"
      },
      {
        "trust": 0.3,
        "url": "http://www.belkin.com/index.asp"
      },
      {
        "trust": 0.3,
        "url": "http://securityevaluators.com/content/case-studies/routers/belkin_n900.jsp"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63094"
      },
      {
        "db": "BID",
        "id": "59499"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006656"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-588"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3092"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-63094"
      },
      {
        "db": "BID",
        "id": "59499"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006656"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-588"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3092"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-09-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63094"
      },
      {
        "date": "2013-04-25T00:00:00",
        "db": "BID",
        "id": "59499"
      },
      {
        "date": "2014-10-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-006656"
      },
      {
        "date": "2013-04-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201304-588"
      },
      {
        "date": "2014-09-29T22:55:08.473000",
        "db": "NVD",
        "id": "CVE-2013-3092"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-10-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63094"
      },
      {
        "date": "2013-04-25T00:00:00",
        "db": "BID",
        "id": "59499"
      },
      {
        "date": "2014-10-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-006656"
      },
      {
        "date": "2014-10-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201304-588"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2013-3092"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "specific network environment",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-588"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Belkin N300 Wi-Fi N Router Vulnerabilities that bypass authentication",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-006656"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-588"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…