Description
A vulnerability was identified in Belkin F9K1015 1.00.10. This issue affects the function formReboot of the file /goform/formReboot. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-06
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow occurs in the formReboot function when the webpage argument is manipulated. This flaw allows an attacker to corrupt the device’s stack, potentially leading to the execution of arbitrary code. The vulnerability can be triggered from a remote location because the vulnerable endpoint is accessible over the network. The presence of a publicly available exploit increases the risk that attackers could successfully target vulnerable devices.

Affected Systems

The flaw exists in Belkin’s F9K1015 home networking device with firmware version 1.00.10. Only this specific firmware build is known to be affected, as indicated by the vendor’s product identification and the referenced CPE string.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity, and the lack of an EPSS value does not diminish the seriousness of potential exploitation. The vulnerability is not listed in the CISA KEV catalog, but because the attack vector is remote and exploits are publicly available, the likelihood that attackers will target affected devices is significant. Due to the vendor’s lack of response, there is no official patch currently available, further increasing the security gap.

Generated by OpenCVE AI on April 6, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Belkin’s official support site for a firmware update that addresses the formReboot overflow.
  • If an updated firmware is not available, upgrade the device to a newer, non‑vulnerable model if possible.
  • Configure network perimeter devices to block or rate‑limit access to the /goform/formReboot endpoint on the device.
  • Monitor the device for unusual reboot activity or unexpected firmware changes.
  • Maintain backups of critical configuration data prior to any firmware changes so that settings can be restored if needed.

Generated by OpenCVE AI on April 6, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Belkin f9k1015
Vendors & Products Belkin f9k1015

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Belkin F9K1015 1.00.10. This issue affects the function formReboot of the file /goform/formReboot. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Belkin F9K1015 formReboot stack-based overflow
First Time appeared Belkin
Belkin f9k1015 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:belkin:f9k1015_firmware:*:*:*:*:*:*:*:*
Vendors & Products Belkin
Belkin f9k1015 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Belkin F9k1015 F9k1015 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T14:49:56.235Z

Reserved: 2026-04-05T15:29:54.593Z

Link: CVE-2026-5613

cve-icon Vulnrichment

Updated: 2026-04-06T14:41:47.433Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T03:16:07.990

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:47:33Z

Weaknesses