CVE-2009-20009
Belkin Bulldog Plus Web Service Buffer Overflow
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Belkin Bulldog Plus version 4.0.2 build 1219 contains a stack-based buffer overflow vulnerability in its web service authentication handler. When a specially crafted HTTP request is sent with an oversized Authorization header, the application fails to properly validate the input length before copying it into a fixed-size buffer, resulting in memory corruption and potential remote code execution. Exploitation requires network access and does not require prior authentication.
| CWE | CWE-121 |
| Vendor | belkin international, inc. |
| Product | bulldog plus ups monitoring software |
| Published | Aug 30, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for belkin international, inc. bulldog plus ups monitoring software
Be the first to know when new unknown vulnerabilities affecting belkin international, inc. bulldog plus ups monitoring software are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Belkin International, Inc. / Bulldog Plus UPS Monitoring Software
* โค 4.0.2 build 1219
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/belkin_bulldog.rb exploit-db.com: https://www.exploit-db.com/exploits/8173 fortiguard.com: https://www.fortiguard.com/encyclopedia/ips/17325/belkin-bulldog-plus-web-services-buffer-overflow s3.belkin.com: https://s3.belkin.com/support/dl/bulldogwindows.pdf vulncheck.com: https://www.vulncheck.com/advisories/belkin-bulldog-plus-web-service-buffer-overflow
Credits
Elazar