Wireless network belkin status validating status
Cross-site request forgery (CSRF) vulnerability in cgi-bin/system_in Belkin F5D8236-4 v2 allows remote attackers to hijack the authentication of administrators for requests that open the remote management interface on arbitrary ports via the remote_mgmt_enabled and remote_mgmt_port parameters.
The WPA2 implementation on the Belkin N900 F9K1104v1 router establishes a WPS PIN based on 6 digits of the LAN/WLAN MAC address, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading broadcast packets, a different vulnerability than CVE-2012-4366.
Belkin F9K1102 2 devices with firmware 2.10.17 rely on client-side Java Script code for authorization, which allows remote attackers to obtain administrative privileges via certain changes to Lock Status and Login_Success values.
Belkin F9K1102 2 devices with firmware 2.10.17 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value.
Although it was always working fine with my 802.11G nettop, my wife's 801.11N computer was losing connection on a regular basis. If not a log, it might have a status page that you can check for clues.
I was first blaming Windows, as it was fine under Linux with a cheaper internal wireless adapter. You could also try pinging a few other sites and doing some nslookup commands to see if DNS is still working.
When enabled the telnet session requires no password and provides root access.If it is very regular, it may be some sort of interference.For example, cordless phones change frequency at set intervals and since some share the 2.4 GHz frequency range, they may selectively jam certain channels at set intervals.The Belkin We Mo Home Automation firmware before 3949 does not maintain a set of Certification Authority public keys, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary X.509 certificate.
The Belkin We Mo Home Automation firmware before 3949 does not use SSL for the distribution feed, which allows man-in-the-middle attackers to install arbitrary firmware by spoofing a distribution server.Multiple cross-site scripting (XSS) vulnerabilities in Belkin N300 router allow remote attackers to inject arbitrary web script or HTML via the Guest Access PSK field to wireless_guest2_or other unspecified vectors.