Description
A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-06
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

A stack‑based buffer overflow exists in the formSetSystemSettings handler of Belkin F9K1015 firmware 1.00.10. When an attacker crafts a request that manipulates the "webpage" argument, the service writes beyond the bounds of a stack buffer, corrupting control data. Successful exploitation can lead to arbitrary code execution on the device, compromising confidentiality, integrity, and availability.

Affected Systems

The affected system is the Belkin F9K1015 router running firmware version 1.00.10. The relevant component is the Setting Handler accessible through the web interface. No other firmware versions are listed, so the impact is confined to this specific build.

Risk and Exploitability

The vulnerability scores a CVSS of 8.7, indicating high severity, and is not yet recorded in KEV. Public exploits have been disclosed, meaning the probability of remote exploitation is high despite no EPSS score. Attackers can trigger the overflow by sending malicious HTTP requests to the router’s web interface, so exposure occurs over the network.

Generated by OpenCVE AI on April 6, 2026 at 07:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Belkin firmware that fixes the formSetSystemSettings overflow.
  • If a fix is not yet available, block or disable remote management access to the router’s web interface.
  • Restrict access to the /goform/formSetSystemSettings endpoint to trusted networks or IP addresses.
  • Monitor router logs for failed or suspicious requests to the formSetSystemSettings handler.

Generated by OpenCVE AI on April 6, 2026 at 07:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Belkin f9k1015
Vendors & Products Belkin f9k1015

Mon, 06 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 05:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Belkin F9K1015 Setting formSetSystemSettings stack-based overflow
First Time appeared Belkin
Belkin f9k1015 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:belkin:f9k1015_firmware:*:*:*:*:*:*:*:*
Vendors & Products Belkin
Belkin f9k1015 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Belkin F9k1015 F9k1015 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T12:37:23.567Z

Reserved: 2026-04-05T19:04:45.464Z

Link: CVE-2026-5628

cve-icon Vulnrichment

Updated: 2026-04-06T12:37:16.259Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T06:16:22.087

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5628

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:47:21Z

Weaknesses