Description
A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue is the function formWISP5G of the file /goform/formWISP5G. Such manipulation of the argument webpage leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-06
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The formWISP5G function in the router’s web interface is exposed to a stack-based buffer overflow when an attacker supplies oversized arguments. This flaw can be triggered remotely without authentication and may allow the attacker to execute arbitrary code or cause a denial of service, reflecting classic buffer overflow and stack corruption weaknesses.

Affected Systems

The vulnerability affects Belkin F9K1015 routers running firmware version 1.00.10. The impacted code resides in the /goform/formWISP5G handler of the device’s web interface, and only devices with this firmware revision are known to be vulnerable.

Risk and Exploitability

The vulnerability scores a CVSS of 8.7, indicating high severity. EPSS data is not available and it is not listed in the CISA KEV catalog, but the public disclosure and ability to exploit it from any network that reaches the router’s web interface suggest a realistic and potentially high-impact threat. Attackers can perform the exploit by sending a crafted HTTP request to the formWISP5G endpoint and may gain full control over the device.

Generated by OpenCVE AI on April 6, 2026 at 04:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any official firmware update from Belkin that addresses the vulnerability immediately.
  • If no update is available, isolate the router by placing it behind a firewall, VPN, or restricting inbound access to trusted management IPs.
  • Disable or block access to the /goform/formWISP5G endpoint if the router firmware allows it.
  • Monitor router logs for unusually large HTTP requests or repeated attempts to access the endpoint and investigate any suspicious activity.
  • Contact Belkin support to confirm whether a fix is planned or available and follow their guidance.

Generated by OpenCVE AI on April 6, 2026 at 04:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Belkin f9k1015
Vendors & Products Belkin f9k1015

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue is the function formWISP5G of the file /goform/formWISP5G. Such manipulation of the argument webpage leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Belkin F9K1015 formWISP5G stack-based overflow
First Time appeared Belkin
Belkin f9k1015 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:belkin:f9k1015_firmware:*:*:*:*:*:*:*:*
Vendors & Products Belkin
Belkin f9k1015 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Belkin F9k1015 F9k1015 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T14:47:35.514Z

Reserved: 2026-04-05T15:29:44.472Z

Link: CVE-2026-5610

cve-icon Vulnrichment

Updated: 2026-04-06T14:47:27.645Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T02:16:00.927

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5610

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:47:36Z

Weaknesses