Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11292: Command Injection in Belkin F9K1015

0
Medium
VulnerabilityCVE-2025-11292cvecve-2025-11292
Published: Sun Oct 05 2025 (10/05/2025, 14:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Belkin
Product: F9K1015

Description

A weakness has been identified in Belkin F9K1015 1.00.10. Affected is an unknown function of the file /goform/formBSSetSitesurvey. Executing a manipulation of the argument wan_ipaddr can lead to command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:47:15 UTC

Technical Analysis

CVE-2025-11292 is a medium-severity command injection vulnerability affecting the Belkin F9K1015 router running firmware version 1.00.10. The vulnerability resides in an unspecified function handling the /goform/formBSSetSitesurvey endpoint, specifically through the wan_ipaddr parameter. By crafting malicious input to this parameter, an attacker can inject and execute arbitrary system commands on the router remotely. The attack vector is network-based, requiring no authentication or user interaction, and has low complexity, making it accessible to a wide range of attackers. The vulnerability was responsibly disclosed to Belkin, but the vendor has not issued any patches or advisories. Public exploit code is available, increasing the risk of exploitation. The CVSS 4.0 vector indicates no privileges or user interaction are needed, and the impact affects confidentiality, integrity, and availability at a low level. The lack of vendor response and patch availability leaves affected devices exposed. Exploitation could lead to full compromise of the router, enabling attackers to intercept, modify, or disrupt network traffic, launch further attacks within the network, or use the device as a foothold for persistent access.

Potential Impact

The impact of CVE-2025-11292 is significant for organizations and individuals using the Belkin F9K1015 router with vulnerable firmware. Successful exploitation allows remote attackers to execute arbitrary commands on the device, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception and manipulation of sensitive data, disruption of network services, and use of the compromised router as a pivot point for lateral movement or launching attacks against other targets. The vulnerability undermines the confidentiality, integrity, and availability of network communications. Since the exploit requires no authentication or user interaction, attackers can target devices en masse, increasing the risk of widespread compromise. The absence of a vendor patch exacerbates the threat, leaving many devices vulnerable. Organizations relying on this router model for critical network infrastructure face risks including data breaches, operational downtime, and reputational damage.

Mitigation Recommendations

Given the absence of an official patch from Belkin, organizations should implement the following mitigations: 1) Immediately isolate and replace affected Belkin F9K1015 routers with models from vendors that provide timely security updates. 2) If replacement is not immediately feasible, restrict network access to the router’s management interface by applying firewall rules to limit access only to trusted administrative IP addresses. 3) Disable remote management features on the router to prevent external exploitation. 4) Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected outbound connections or command execution patterns. 5) Employ network segmentation to limit the impact of a compromised router on critical systems. 6) Regularly audit and update router firmware when vendor patches become available. 7) Educate network administrators about this vulnerability and encourage vigilance for signs of compromise. These steps go beyond generic advice by focusing on compensating controls and network-level protections to mitigate risk until a vendor patch is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-04T18:45:15.714Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e27c0780a937f685525155

Added to database: 10/5/2025, 2:09:11 PM

Last enriched: 2/24/2026, 9:47:15 PM

Last updated: 3/22/2026, 7:06:31 PM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses