Impact
A stack‑based buffer overflow exists in the formSetSystemSettings handler of Belkin F9K1015 firmware 1.00.10. When an attacker crafts a request that manipulates the "webpage" argument, the service writes beyond the bounds of a stack buffer, corrupting control data. Successful exploitation can lead to arbitrary code execution on the device, compromising confidentiality, integrity, and availability.
Affected Systems
The affected system is the Belkin F9K1015 router running firmware version 1.00.10. The relevant component is the Setting Handler accessible through the web interface. No other firmware versions are listed, so the impact is confined to this specific build.
Risk and Exploitability
The vulnerability scores a CVSS of 8.7, indicating high severity, and is not yet recorded in KEV. Public exploits have been disclosed, meaning the probability of remote exploitation is high despite no EPSS score. Attackers can trigger the overflow by sending malicious HTTP requests to the router’s web interface, so exposure occurs over the network.
OpenCVE Enrichment