Linksys CG7500 WiFi Router

Platform Information https://www.linksys.com/us/p/CG7500/?bvrrp=Main_Site-en_US/reviews/product/2/P-CG7500.htm
Search Engine Search on Google
End of Sales -
End of Support -
Wired Connection Yes
Wireless Connection Yes
Fingerprinting Source HTTP NIC VENDOR
Added at Jun 11, 2019
Manufacturer Name Belkin International, Inc.
Homepage http://www.belkin.com
Headquarters United States of America
Business Status Ongoing
Acquisition Company Foxconn International Holdings Ltd - Hon Hai Precision Industry Co., Ltd more info
Acquisition Company Homepage http://www.foxconn.com/

Platform’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
No records found.
Manufacturer’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
CVE-2019-12780
06/10/2019
CRITICAL
HIGH
The Belkin Wemo Enabled Crock-Pot allows command injection in the Wemo UPnP API via the SmartDevURL argument to the SetSmartDevInfo action. A simple POST request to /upnp/control/basicevent1 can allow an attacker to execute commands without authentication.
CVE-2018-6692
08/21/2018
CRITICAL
HIGH
Stack-based Buffer Overflow vulnerability in libUPnPHndlr.so in Belkin Wemo Insight Smart Plug allows remote attackers to bypass local security protection via a crafted HTTP post packet.
CVE-2018-1146
04/19/2018
HIGH
MEDIUM
A remote unauthenticated user can enable telnet on the Belkin N750 using firmware version 1.10.22 by sending a crafted HTTP request to set.cgi. When enabled the telnet session requires no password and provides root access.
CVE-2018-1145
04/19/2018
CRITICAL
HIGH
A remote unauthenticated user can overflow a stack buffer in the Belkin N750 using firmware version 1.10.22 by sending a crafted HTTP request to proxy.cgi.
CVE-2018-1144
04/19/2018
CRITICAL
HIGH
A remote unauthenticated user can execute commands as root in the Belkin N750 using firmware version 1.10.22 by sending a crafted HTTP request to proxy.cgi.