![]() That provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is maintained by Offensive Security, an information security training company #Author : Discovered and developed by Marco Vaz #Title : Belkin n750 buffer overflow in jump login parameter Successful exploitation of the vulnerability enables the attacker to gain full control of the affected router. The guest network functionality is default functionality and is delivered over an unprotected wifi network. ![]() A vulnerability in the guest network web interface of the Belkin N750 DB Wi-Fi Dual-Band N+ Gigabit Router with firmware F9K1103_WW_1.10.16m, allows an unauthenticated remote attacker to gain root access to the operating system of the affected device.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |