Description
Belkin wireless routers Surf N150 Model F7D1301v1, N900 Model F9K1104v1, N450 Model F9K1105V2, and N300 Model F7D2301v1 generate a predictable default WPA2-PSK passphrase based on eight digits of the WAN MAC address, which allows remote attackers to access the network by sniffing the beacon frames.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by ZhaoChunsheng · pythonremotehardware
https://www.exploit-db.com/exploits/38164
References (4)
Core 4
Core References
Various Sources x_refsource_misc
http://www.jakoblell.com/blog/2012/11/19/cve-2012-4366-insecure-default-wpa2-passphrase-in-multiple-belkin-wireless-routers/
Third Party Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-11/0070.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/56591
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/80157
Scores
EPSS
0.1327
EPSS Percentile
94.2%
Details
CWE
CWE-310
Status
published
Products (4)
belkin/n150_wireless_router
f7d1301v1
belkin/n300_wireless_router
f7d2301v1
belkin/n450_wireless_router
f9k1105v2
belkin/n900_wireless_router
f9k1104v1
Published
Nov 20, 2012
Tracked Since
Feb 18, 2026