Belkin

Security




<p>Belkin International places a high value on security of its networking products. For many people, their home Wi-Fi router is the only barrier between their home network and a multitude of hostile internet threats intent on taking over their devices.</p> <p>To protect our user’s privacy and security, Belkin is happy to accept all vulnerability reports that adhere to our coordinated vulnerability disclosure guidelines.</p> <br> <br> In Scope <ul> <li>Belkin routers, range extenders, keyboards, and other networked devices</li> <li>Linksys routers, range extenders, Wi-Fi dongles, switches, and other networked devices</li> <li>WeMo home automation switches, light bulbs, cameras, and other networked devices</li> </ul> Not In Scope <p> <strong>Any services or systems that are hosted by third party providers or Belkin International owned property, services be it physical or intellectual. This includes and is may not only limited to:</strong> </p> <ul> <li>Belkin.com, Linksys.com, and WeMo.com web endpoints</li> <li>WeMo Cloud</li> <li>Linksys Smart Wi-Fi web and cloud endpoints</li> <li>Social Engineering and Phishing attacks against Belkin employees, contractors, customers, or support</li> </ul> How To Submit <p> <strong>PLEASE READ THE ENTIRE PAGE PRIOR TO SUBMITTING A VULNERABILITY.</strong> </p> <p>If you need help finding your Wi-Fi password or believe your router has been hacked, please contact Technical support below:<br> Linksys<br> Belkin </p> <p>Please click here to submit your vulnerability.</p> DISCLOSURE <p>After receiving your vulnerability report, the Belkin security team will review your report and commission a fix to our remediation team. After Belkin publishes the fix for the affected SKUs listed in your report, Belkin will give the green light to disclose the vulnerability.</p> <p>We ask that all coordinated vulnerability disclosures contain the following information:</p> <ul> <li>A link to the firmware download page containing the fixed firmware</li> <li>A sentence or two in either the title of the disclosure or in the first few paragraphs confirming that a fix for the vulnerability is available</li> <li>Accurate representation of the attack details per the CVSSv3 guidelines (LAN-only attacks are “Local” not “Remote”, etc.)</li> </ul> LEGAL STATEMENT <p>To encourage a healthy working relationship with the security research community, Belkin promises not to engage in legal action against individuals who:</p> <ul> <li>Report vulnerabilities while following the guidelines set by Belkin's Vulnerability Disclosure Program.</li> <li>Engage in vulnerability testing within the scope listed above.</li> <li>Perform security tests on their own Belkin products.</li> <li>Perform security tests on Belkin products with the consent of the owner of the product.</li> </ul> Scroll Up





Comments:
On 2021-01-24 09:57:30 UTC, JustinBack (1764) Staff wrote:

Document has been crawled
Old length: 0 CRC 0
New length: 2832 CRC 11771388