Impact
The formWISP5G function in the router’s web interface is exposed to a stack-based buffer overflow when an attacker supplies oversized arguments. This flaw can be triggered remotely without authentication and may allow the attacker to execute arbitrary code or cause a denial of service, reflecting classic buffer overflow and stack corruption weaknesses.
Affected Systems
The vulnerability affects Belkin F9K1015 routers running firmware version 1.00.10. The impacted code resides in the /goform/formWISP5G handler of the device’s web interface, and only devices with this firmware revision are known to be vulnerable.
Risk and Exploitability
The vulnerability scores a CVSS of 8.7, indicating high severity. EPSS data is not available and it is not listed in the CISA KEV catalog, but the public disclosure and ability to exploit it from any network that reaches the router’s web interface suggest a realistic and potentially high-impact threat. Attackers can perform the exploit by sending a crafted HTTP request to the formWISP5G endpoint and may gain full control over the device.
OpenCVE Enrichment