CVE-2009-20009

CRITICAL

Belkin Bulldog Plus 4.0.2 build 1219 - Buffer Overflow

Title source: llm

Description

Belkin Bulldog Plus version 4.0.2 build 1219 contains a stack-based buffer overflow vulnerability in its web service authentication handler. When a specially crafted HTTP request is sent with an oversized Authorization header, the application fails to properly validate the input length before copying it into a fixed-size buffer, resulting in memory corruption and potential remote code execution. Exploitation requires network access and does not require prior authentication.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Elazar · textremotewindows
https://www.exploit-db.com/exploits/8173
metasploit WORKING POC NORMAL
by MC · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/belkin_bulldog.rb

Scores

CVSS v4 9.3
EPSS 0.6260
EPSS Percentile 98.4%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-121
Status published
Products (1)
Belkin International, Inc./Bulldog Plus UPS Monitoring Software < 4.0.2 build 1219
Published Aug 30, 2025
Tracked Since Feb 18, 2026