Impact
A stack-based buffer overflow exists in the formWISP5G function of Belkin F9K1122 firmware, allowing an attacker to trigger memory corruption and potentially execute arbitrary code. The overflow can be triggered by manipulating the webpage argument of the /goform/formWISP5G endpoint, leading to a compromise of the device’s confidentiality, integrity, and availability.
Affected Systems
The vulnerability affects Belkin F9K1122 devices running firmware 1.00.33 and possibly earlier releases that include the formWISP5G function. All units of this model that have not applied a firmware update to mitigate the flaw are susceptible.
Risk and Exploitability
The flaw carries a CVSS score of 8.7, indicating high severity, and an exploit has been published and is known to be usable. While EPSS data is unavailable, the known presence of an exploit implies a significant risk. The vulnerability can be leveraged remotely through the web interface, and the device does not appear to be listed in CISA’s KEV catalog, but the lack of vendor response further heightens concern.
OpenCVE Enrichment