Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11295: Buffer Overflow in Belkin F9K1015

0
High
VulnerabilityCVE-2025-11295cvecve-2025-11295
Published: Sun Oct 05 2025 (10/05/2025, 16:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Belkin
Product: F9K1015

Description

A flaw has been found in Belkin F9K1015 1.00.10. This affects an unknown part of the file /goform/formPPPoESetup. This manipulation of the argument pppUserName causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:47:59 UTC

Technical Analysis

CVE-2025-11295 identifies a buffer overflow vulnerability in the Belkin F9K1015 router firmware version 1.00.10. The vulnerability resides in the handling of the pppUserName parameter within the /goform/formPPPoESetup endpoint. By sending a specially crafted request manipulating this parameter, an attacker can overflow a buffer, potentially overwriting memory and enabling arbitrary code execution or causing the device to crash. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly dangerous. The CVSS 4.0 base score is 8.7, reflecting its high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although the vendor was contacted early, no patch or mitigation guidance has been provided, and exploit code has been publicly released. This increases the likelihood of active exploitation in the wild. The affected device is commonly used in home and small office environments, often with direct internet exposure, which broadens the attack surface. The lack of vendor response and patch availability necessitates immediate defensive measures by users and administrators.

Potential Impact

The impact of CVE-2025-11295 is significant for organizations and individuals using the Belkin F9K1015 router with firmware version 1.00.10. Successful exploitation can lead to remote code execution, allowing attackers to take full control of the device, intercept or manipulate network traffic, and pivot to internal networks. This compromises confidentiality, integrity, and availability of network communications. The vulnerability can also cause denial of service by crashing the device, disrupting internet connectivity. Since the router is often deployed in home and small office environments, exploitation could lead to data breaches, unauthorized access to connected devices, and persistent network compromise. The public availability of exploit code increases the risk of widespread attacks, including automated scanning and exploitation by botnets or ransomware groups. Organizations relying on these devices for critical connectivity or remote access face operational disruptions and potential data loss.

Mitigation Recommendations

Given the absence of an official patch or vendor response, affected users should immediately implement the following mitigations: 1) Isolate the Belkin F9K1015 device from untrusted networks by placing it behind a firewall or restricting inbound access to management interfaces; 2) Disable remote management features if enabled, especially access to the /goform/formPPPoESetup endpoint; 3) Monitor network traffic for unusual requests targeting the vulnerable endpoint or suspicious activity indicative of exploitation attempts; 4) Replace the affected device with a different router model from a vendor with active security support if feasible; 5) Employ network segmentation to limit the impact of a compromised router on internal systems; 6) Regularly review and update router firmware when vendor patches become available; 7) Use intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once they are released; 8) Educate users about the risks of exposing network devices directly to the internet. These steps reduce exposure and limit the potential damage until a vendor patch is issued.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-04T18:45:29.625Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e29f135aee1242a853dcaa

Added to database: 10/5/2025, 4:38:43 PM

Last enriched: 2/24/2026, 9:47:59 PM

Last updated: 3/22/2026, 7:50:00 AM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses