Impact
A stack-based buffer overflow exists in the formWlEncrypt function of the Belkin F9K1015 firmware. The vulnerability is triggered by a crafted request to the /goform/formWlEncrypt endpoint and can be triggered remotely, allowing an attacker to overwrite the stack and potentially execute arbitrary code on the device. Successful exploitation would compromise the confidentiality, integrity, and availability of the device and any connected networks.
Affected Systems
The affected system is the Belkin F9K1015 router running firmware version 1.00.10. No other versions are specifically listed as vulnerable in the available data.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity vulnerability. Although an EPSS score is not available, the vulnerability is publicly disclosed and exploitable, and it is not yet tracked in the CISA KEV catalog. Because the attack vector is remote and the exploitation path is straightforward—sending a malformed request to a web form—it poses a significant risk to environments that expose the router to untrusted networks.
OpenCVE Enrichment