Impact
A stack-based buffer overflow exists in the formSetSystemSettings handler of Belkin F9K1122 routers. The flaw allows an attacker to send a crafted web request that overflows the stack, potentially enabling remote code execution on the device. This vulnerability directly compromises the confidentiality, integrity, and availability of the affected router.
Affected Systems
Belkin F9K1122 router, firmware version 1.00.33 is affected. The vulnerability may also impact earlier or similar firmware builds, but version 1.00.33 is specifically cited.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, yet the EPSS score is below 1%, suggesting a low probability of exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be remote, achieved through a manipulated HTTP request to the router’s web interface. Because the vendor has not issued a patch and has not responded, this remains a serious, unmitigated risk for exposed devices.
OpenCVE Enrichment