Impact
A stack-based buffer overflow exists in the formSetSystemSettings function of the Belkin F9K1122 router firmware 1.00.33. By manipulating the webpage argument sent to the /goform/formSetSystemSettings handler, an attacker can corrupt the device’s stack memory. The CVE description notes that the flaw can be triggered remotely and that a publicly available exploit is known. The description does not explicitly say that arbitrary code is executed, but the nature of the overflow makes it inferred that an attacker could potentially run malicious code, which would compromise confidentiality, integrity, or availability of the device.
Affected Systems
Belkin F9K1122 routers running firmware version 1.00.33 are affected. No other firmware versions or models appear in the data. The vulnerability is limited to the Setting Handler component accessed through the router’s web interface.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity. EPSS data is not available, and the vulnerability is not in the CISA KEV catalog, yet the public exploit lowers the threshold for attackers. The likely attack vector is remote, via traffic to the router’s web management port. Because the flaw can be triggered without local access, an external attacker could potentially disrupt or hijack the device. The overall risk is significant and requires prompt mitigation.
OpenCVE Enrichment