Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11298: Command Injection in Belkin F9K1015

0
Medium
VulnerabilityCVE-2025-11298cvecve-2025-11298
Published: Sun Oct 05 2025 (10/05/2025, 18:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Belkin
Product: F9K1015

Description

A vulnerability was determined in Belkin F9K1015 1.00.10. Impacted is an unknown function of the file /goform/formSetWanStatic. Executing a manipulation of the argument m_wan_ipaddr can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:48:43 UTC

Technical Analysis

CVE-2025-11298 identifies a command injection vulnerability in the Belkin F9K1015 router firmware version 1.00.10. The vulnerability resides in an unspecified function handling the /goform/formSetWanStatic endpoint, specifically via the m_wan_ipaddr parameter. An attacker can remotely send crafted requests to this endpoint to inject and execute arbitrary system commands on the device. The attack vector requires no authentication or user interaction, making it remotely exploitable over the network. The vulnerability impacts the device's confidentiality, integrity, and availability by allowing full command execution, potentially enabling attackers to control the router, intercept or manipulate network traffic, or pivot into internal networks. The CVSS 4.0 score is 5.3 (medium), reflecting the ease of exploitation but limited scope or impact compared to more critical vulnerabilities. The vendor was notified but has not issued any patches or advisories, and no known exploits have been observed in the wild yet. The public disclosure of exploit details increases the risk of exploitation by threat actors. The lack of patch availability necessitates immediate defensive actions to mitigate risk.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary commands on affected Belkin F9K1015 routers, potentially leading to full compromise of the device. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and use of the compromised router as a foothold for further attacks. Organizations relying on these routers for WAN connectivity or network perimeter defense may face data breaches, service outages, and lateral movement by attackers. The absence of authentication requirements and user interaction lowers the barrier for exploitation, increasing the threat to both home users and enterprise environments using this hardware. The impact extends to confidentiality, integrity, and availability of network communications and connected systems.

Mitigation Recommendations

1. Immediately isolate affected Belkin F9K1015 routers from untrusted networks, especially the internet, to prevent remote exploitation. 2. Disable remote management interfaces and any WAN-facing services that expose the /goform/formSetWanStatic endpoint. 3. Implement strict firewall rules to restrict access to router management interfaces to trusted internal IP addresses only. 4. Monitor network traffic for unusual or suspicious requests targeting the vulnerable endpoint or abnormal command execution patterns. 5. Replace affected devices with routers from vendors with active security support if patches remain unavailable. 6. If replacement is not immediately feasible, consider deploying network segmentation to limit potential lateral movement from compromised routers. 7. Regularly check for vendor updates or community patches and apply them promptly once available. 8. Educate network administrators about this vulnerability and encourage vigilance for signs of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-04T18:45:37.415Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e2b3a20e7d28f9448242cb

Added to database: 10/5/2025, 6:06:26 PM

Last enriched: 2/24/2026, 9:48:43 PM

Last updated: 3/26/2026, 2:33:31 AM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses