Stack-Based Buffer Overflow in Belkin F9K1015 Router
CVE-2026-5628
Key Information:
Badges
What is CVE-2026-5628?
A security vulnerability affecting the Belkin F9K1015 router has been identified in the formSetSystemSettings function within the Setting Handler component. This vulnerability arises from improper handling of the 'webpage' argument, which can lead to a stack-based buffer overflow. As a result, an attacker could potentially manipulate this function to execute arbitrary code remotely. Despite early disclosure attempts to the vendor, no response has been received, increasing the risk of exploitation through this publicly known vulnerability.
Affected Version(s)
F9K1015 1.00.10
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
