CVE-2012-4366

Belkin N150 Wireless Router - Cryptographic Issue

Title source: rule
STIX 2.1

Description

Belkin wireless routers Surf N150 Model F7D1301v1, N900 Model F9K1104v1, N450 Model F9K1105V2, and N300 Model F7D2301v1 generate a predictable default WPA2-PSK passphrase based on eight digits of the WAN MAC address, which allows remote attackers to access the network by sniffing the beacon frames.

Exploits (1)

exploitdb WORKING POC VERIFIED
by ZhaoChunsheng · pythonremotehardware
https://www.exploit-db.com/exploits/38164

References (4)

Core 4
Core References
Third Party Advisory mailing-list x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-11/0070.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/56591
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/80157

Scores

EPSS 0.1327
EPSS Percentile 94.2%

Details

CWE
CWE-310
Status published
Products (4)
belkin/n150_wireless_router f7d1301v1
belkin/n300_wireless_router f7d2301v1
belkin/n450_wireless_router f9k1105v2
belkin/n900_wireless_router f9k1104v1
Published Nov 20, 2012
Tracked Since Feb 18, 2026