Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the function formWISP5G of the file /goform/formWISP5G. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Belkin F9K1122 formWISP5G stack-based overflow | |
| First Time appeared |
Belkin
Belkin f9k1122 Firmware |
|
| Weaknesses | CWE-119 CWE-121 |
|
| CPEs | cpe:2.3:o:belkin:f9k1122_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Belkin
Belkin f9k1122 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-23T01:30:07.272Z
Reserved: 2026-03-22T08:31:26.455Z
Link: CVE-2026-4566
No data.
Status : Received
Published: 2026-03-23T03:16:00.083
Modified: 2026-03-23T03:16:00.083
Link: CVE-2026-4566
No data.
OpenCVE Enrichment
No data.