Home

Description

Belkin Bulldog Plus version 4.0.2 build 1219 contains a stack-based buffer overflow vulnerability in its web service authentication handler. When a specially crafted HTTP request is sent with an oversized Authorization header, the application fails to properly validate the input length before copying it into a fixed-size buffer, resulting in memory corruption and potential remote code execution. Exploitation requires network access and does not require prior authentication.

PUBLISHED Reserved 2025-08-28 | Published 2025-08-30 | Updated 2025-09-02 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unaffected

*
affected

Credits

Elazar finder

References

raw.githubusercontent.com/.../windows/http/belkin_bulldog.rb exploit

www.exploit-db.com/exploits/8173 exploit

www.fortiguard.com/...ldog-plus-web-services-buffer-overflow third-party-advisory

s3.belkin.com/support/dl/bulldogwindows.pdf product

www.vulncheck.com/...ulldog-plus-web-service-buffer-overflow third-party-advisory

cve.org (CVE-2009-20009)

nvd.nist.gov (CVE-2009-20009)

Download JSON