This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Absolute Path Traversal in Belkin N150 F9K1009 router. π₯ **Consequences**: Remote attackers can read **arbitrary files** on the device via the `getpage` parameter. Critical data exposure risk!
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: Flaw in the **webproc cgi module**. π **CWE**: Path Traversal (implied by description). The system fails to sanitize full pathnames provided in the `getpage` input.
Q3Who is affected? (Versions/Components)
π¦ **Affected Product**: Belkin N150 F9K1009 v1 Router. π **Vulnerable Versions**: Firmware **1.00.07 and earlier**. Anything before 1.00.08 is at risk!
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Attacker Action**: Read **any file** on the router's filesystem. π **Impact**: Could expose sensitive configs, credentials, or logs. No privilege escalation needed for file reading.
Q5Is exploitation threshold high? (Auth/Config)
β‘ **Exploitation Threshold**: **LOW**. π **Auth**: Remote/Unauthenticated. π― **Config**: Simple HTTP request with a crafted `getpage` parameter containing a full path. Easy to trigger!
Q6Is there a public Exp? (PoC/Wild Exploitation)
π£ **Public Exp?**: **YES**. π **PoC**: Available on Exploit-DB (ID: 38488) and Nuclei templates. π Wild exploitation is possible since the vector is well-documented.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for Belkin N150 F9K1009 devices. π§ͺ **Test**: Send HTTP requests with `getpage=/etc/passwd` (or similar sensitive paths). If the file content is returned, you are vulnerable!
π§ **No Patch Workaround**: π« **Block Access**: Restrict HTTP access to the router's management interface. π **Firewall**: Block external access to the `webproc` CGI endpoint if possible.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **HIGH**. π **Published**: June 2014. π¨ **Priority**: Immediate patching required for any remaining devices. Public exploits exist, making it a prime target for automated attacks!