Description
A vulnerability was determined in Belkin F9K1122 1.00.33. This affects the function formReboot of the file /goform/formReboot. This manipulation of the argument webpage causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-15
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Potential remote exploitation
Action: Assess Impact
AI Analysis

Impact

A stack-based buffer overflow exists in the formReboot function of the /goform/formReboot page on Belkin F9K1122 firmware 1.00.33. The vulnerability is triggered through a manipulated web form argument and can be invoked remotely. The output of the CVE description does not explicitly state that the overflow results in arbitrary code execution; this is a reasonable inference based on typical stack overflows, but it is not confirmed by the vendor or the disclosure material.

Affected Systems

Devices running Belkin F9K1122 firmware version 1.00.33 are affected. The corresponding CPE identifier is cpe:2.3:o:belkin:f9k1122_firmware:*:*:*:*:*:*:*:*.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the near term. The vulnerability is not listed in the CISA KEV catalog. Exploitation appears to require only remote access to the device’s HTTP interface and the ability to send a specially crafted request to /goform/formReboot, as demonstrated in publicly disclosed proof‑of‑concept code. No vendor patch or workaround is currently available, so the risk remains unless mitigated.

Generated by OpenCVE AI on March 17, 2026 at 17:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether a newer firmware release includes a fix and apply it if available.
  • Disable or restrict remote management access to the device.
  • Block or filter HTTP requests to /goform/formReboot using firewall or ACL rules.
  • Monitor device logs for anomalous activity.
  • Isolate the device through network segmentation.

Generated by OpenCVE AI on March 17, 2026 at 17:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Belkin f9k1122
Vendors & Products Belkin f9k1122

Sun, 15 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Belkin F9K1122 1.00.33. This affects the function formReboot of the file /goform/formReboot. This manipulation of the argument webpage causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title Belkin F9K1122 formReboot stack-based overflow
First Time appeared Belkin
Belkin f9k1122 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:belkin:f9k1122_firmware:*:*:*:*:*:*:*:*
Vendors & Products Belkin
Belkin f9k1122 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Belkin F9k1122 F9k1122 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-17T13:48:43.966Z

Reserved: 2026-03-14T12:32:38.218Z

Link: CVE-2026-4167

cve-icon Vulnrichment

Updated: 2026-03-17T13:48:39.871Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:19:56.130

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-4167

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:02:01Z

Weaknesses