Intrusion Prevention



This indicates an attack attempt to exploit an Authentication Bypass Vulnerability in Belkin Linksys Velop devices.
A remote attack could exploit this vulnerability by sending a crafted command to the vulnerable server. Successful exploitation of this vulnerability could allow a remote attacker to bypass authentication and extract credentials from the device.

Affected Products

Belkin Linksys Velop firmware version before


Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.

CVE References