Description
A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affects the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. Such manipulation of the argument webpage leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-29
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: Remote attack via stack-based buffer overflow
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the formSetSystemSettings function of the Belkin F9K1122 router firmware 1.00.33. By manipulating the webpage argument sent to the /goform/formSetSystemSettings handler, an attacker can corrupt the device’s stack memory. The CVE description notes that the flaw can be triggered remotely and that a publicly available exploit is known. The description does not explicitly say that arbitrary code is executed, but the nature of the overflow makes it inferred that an attacker could potentially run malicious code, which would compromise confidentiality, integrity, or availability of the device.

Affected Systems

Belkin F9K1122 routers running firmware version 1.00.33 are affected. No other firmware versions or models appear in the data. The vulnerability is limited to the Setting Handler component accessed through the router’s web interface.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity. EPSS data is not available, and the vulnerability is not in the CISA KEV catalog, yet the public exploit lowers the threshold for attackers. The likely attack vector is remote, via traffic to the router’s web management port. Because the flaw can be triggered without local access, an external attacker could potentially disrupt or hijack the device. The overall risk is significant and requires prompt mitigation.

Generated by OpenCVE AI on March 29, 2026 at 14:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware upgrade that removes the buffer overflow vulnerability, if such a release is available from Belkin.
  • Restrict external access to the router’s web management interface, for example by blocking the /goform/formSetSystemSettings endpoint or limiting the management port to trusted internal networks only.
  • Deploy firewall or router ACLs that deny inbound traffic to the management port from untrusted IP ranges.
  • Monitor HTTP traffic for suspicious POST requests targeting /goform/formSetSystemSettings and investigate anomalies.
  • Reach out to Belkin support or check their website for an official patch or advisory for this router model.

Generated by OpenCVE AI on March 29, 2026 at 14:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 29 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affects the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. Such manipulation of the argument webpage leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Belkin F9K1122 Setting formSetSystemSettings stack-based overflow
First Time appeared Belkin
Belkin f9k1122 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:belkin:f9k1122_firmware:*:*:*:*:*:*:*:*
Vendors & Products Belkin
Belkin f9k1122 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Belkin F9k1122 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-29T12:15:10.537Z

Reserved: 2026-03-27T16:35:50.165Z

Link: CVE-2026-5044

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-29T13:17:03.573

Modified: 2026-03-29T13:17:03.573

Link: CVE-2026-5044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:31:38Z

Weaknesses