Belkin Bulldog Plus version 4.0.2 build 1219 contains a stack-based buffer overflow vulnerability in its web service authentication handler. When a specially crafted HTTP request is sent with an oversized Authorization header, the application fails to properly validate the input length before copying it into a fixed-size buffer, resulting in memory corruption and potential remote code execution. Exploitation requires network access and does not require prior authentication.
Metrics
Affected Vendors & Products
References
History
Tue, 02 Sep 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Belkin
Belkin bulldog Plus |
|
Vendors & Products |
Belkin
Belkin bulldog Plus |
Sat, 30 Aug 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Belkin Bulldog Plus version 4.0.2 build 1219 contains a stack-based buffer overflow vulnerability in its web service authentication handler. When a specially crafted HTTP request is sent with an oversized Authorization header, the application fails to properly validate the input length before copying it into a fixed-size buffer, resulting in memory corruption and potential remote code execution. Exploitation requires network access and does not require prior authentication. | |
Title | Belkin Bulldog Plus Web Service Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-09-02T20:46:59.152Z
Reserved: 2025-08-28T17:25:02.939Z
Link: CVE-2009-20009

No data.

Status : Awaiting Analysis
Published: 2025-08-30T14:15:34.153
Modified: 2025-09-02T15:55:25.420
Link: CVE-2009-20009

No data.

Updated: 2025-09-02T15:23:27Z