Critical severityNVD Advisory· Published Aug 30, 2025· Updated Apr 15, 2026
CVE-2009-20009
CVE-2009-20009
Description
Belkin Bulldog Plus version 4.0.2 build 1219 contains a stack-based buffer overflow vulnerability in its web service authentication handler. When a specially crafted HTTP request is sent with an oversized Authorization header, the application fails to properly validate the input length before copying it into a fixed-size buffer, resulting in memory corruption and potential remote code execution. Exploitation requires network access and does not require prior authentication.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/belkin_bulldog.rbnvd
- s3.belkin.com/support/dl/bulldogwindows.pdfnvd
- www.exploit-db.com/exploits/8173nvd
- www.fortiguard.com/encyclopedia/ips/17325/belkin-bulldog-plus-web-services-buffer-overflownvd
- www.vulncheck.com/advisories/belkin-bulldog-plus-web-service-buffer-overflownvd
News mentions
0No linked articles in our index yet.