Description
A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affects the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. Such manipulation of the argument webpage leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-29
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the formSetSystemSettings handler of Belkin F9K1122 routers. The flaw allows an attacker to send a crafted web request that overflows the stack, potentially enabling remote code execution on the device. This vulnerability directly compromises the confidentiality, integrity, and availability of the affected router.

Affected Systems

Belkin F9K1122 router, firmware version 1.00.33 is affected. The vulnerability may also impact earlier or similar firmware builds, but version 1.00.33 is specifically cited.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity, yet the EPSS score is below 1%, suggesting a low probability of exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be remote, achieved through a manipulated HTTP request to the router’s web interface. Because the vendor has not issued a patch and has not responded, this remains a serious, unmitigated risk for exposed devices.

Generated by OpenCVE AI on March 30, 2026 at 20:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a vendor-released firmware update that resolves the buffer overflow.
  • If no patch is available, block or restrict external access to the router’s web administration interface.
  • Upgrade the firmware to the latest available release once it addresses the flaw.
  • Continuously monitor system logs for anomalous activity related to web management functions.
  • Submit the vulnerability details to the vendor to prompt a formal response and patch release.

Generated by OpenCVE AI on March 30, 2026 at 20:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:belkin:f9k1122:-:*:*:*:*:*:*:*
cpe:2.3:o:belkin:f9k1122_firmware:1.00.33:*:*:*:*:*:*:*

Mon, 30 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Belkin f9k1122
Vendors & Products Belkin f9k1122

Sun, 29 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affects the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. Such manipulation of the argument webpage leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Belkin F9K1122 Setting formSetSystemSettings stack-based overflow
First Time appeared Belkin
Belkin f9k1122 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:belkin:f9k1122_firmware:*:*:*:*:*:*:*:*
Vendors & Products Belkin
Belkin f9k1122 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Belkin F9k1122 F9k1122 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T11:48:45.133Z

Reserved: 2026-03-27T16:35:50.165Z

Link: CVE-2026-5044

cve-icon Vulnrichment

Updated: 2026-03-30T11:48:22.026Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-29T13:17:03.573

Modified: 2026-03-30T19:02:07.003

Link: CVE-2026-5044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:56:50Z

Weaknesses