Description
Belkin Bulldog Plus version 4.0.2 build 1219 contains a stack-based buffer overflow vulnerability in its web service authentication handler. When a specially crafted HTTP request is sent with an oversized Authorization header, the application fails to properly validate the input length before copying it into a fixed-size buffer, resulting in memory corruption and potential remote code execution. Exploitation requires network access and does not require prior authentication.
Problem types
CWE-121 Stack-based Buffer Overflow
Product status
*
Credits
Elazar
References
raw.githubusercontent.com/.../windows/http/belkin_bulldog.rb
www.exploit-db.com/exploits/8173
www.fortiguard.com/...ldog-plus-web-services-buffer-overflow
s3.belkin.com/support/dl/bulldogwindows.pdf
www.vulncheck.com/...ulldog-plus-web-service-buffer-overflow