CVE-2009-20009
Gravedad CVSS v4.0:
CRÍTICA
Tipo:
CWE-121
Desbordamiendo de búfer basado en pila (Stack)
Fecha de publicación:
30/08/2025
Última modificación:
02/09/2025
Descripción
*** Pendiente de traducción *** Belkin Bulldog Plus version 4.0.2 build 1219 contains a stack-based buffer overflow vulnerability in its web service authentication handler. When a specially crafted HTTP request is sent with an oversized Authorization header, the application fails to properly validate the input length before copying it into a fixed-size buffer, resulting in memory corruption and potential remote code execution. Exploitation requires network access and does not require prior authentication.
Impacto
Puntuación base 4.0
9.30
Gravedad 4.0
CRÍTICA
Referencias a soluciones, herramientas e información
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/belkin_bulldog.rb
- https://s3.belkin.com/support/dl/bulldogwindows.pdf
- https://www.exploit-db.com/exploits/8173
- https://www.fortiguard.com/encyclopedia/ips/17325/belkin-bulldog-plus-web-services-buffer-overflow
- https://www.vulncheck.com/advisories/belkin-bulldog-plus-web-service-buffer-overflow



