Description
A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the function formWISP5G of the file /goform/formWISP5G. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References (5)
Core 5
Core References
Vdb Entry, Technical Description vdb-entry
technical-description
VDB-352403 | Belkin F9K1122 formWISP5G stack-based overflow
https://vuldb.com/?id.352403
Signature, Permissions Required signature
permissions-required
VDB-352403 | CTI Indicators (IOB, IOC, IOA)
https://vuldb.com/?ctiid.352403
Third Party Advisory third-party-advisory
Submit #775132 | Belkin F9K1122 1.00.33 Stack-based Buffer Overflow
https://vuldb.com/?submit.775132
Scores
CVSS v3
8.8
EPSS
0.0011
EPSS Percentile
28.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-119
CWE-121
Status
published
Products (2)
Belkin/F9K1122
1.00.33
belkin/f9k1122_firmware
1.00.33
Published
Mar 23, 2026
Tracked Since
Mar 23, 2026