CVE-2025-7082: OS Command Injection in Belkin F9K1122
A vulnerability was found in Belkin F9K1122 1.00.33 and classified as critical. Affected by this issue is the function formBSSetSitesurvey of the file /goform/formBSSetSitesurvey of the component webs. The manipulation of the argument wan_ipaddr/wan_netmask/wan_gateway/wl_ssid is directly passed by the attacker/so we can control the wan_ipaddr/wan_netmask/wan_gateway/wl_ssid leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-7082 is a security vulnerability identified in the Belkin F9K1122 router firmware version 1.00.33. The flaw exists in the web component, specifically within the function formBSSetSitesurvey located at /goform/formBSSetSitesurvey. This function improperly handles user-supplied input parameters such as wan_ipaddr, wan_netmask, wan_gateway, and wl_ssid. An attacker can manipulate these parameters to inject arbitrary OS commands due to insufficient input validation and sanitization. This vulnerability enables remote attackers to execute commands on the underlying operating system with the privileges of the web service process. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. Although the CVSS v4.0 score is 5.3 (medium severity), the ability to execute OS commands remotely can lead to significant compromise depending on the context. The vendor, Belkin, was contacted but has not responded or issued a patch at the time of disclosure. No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation. The vulnerability affects a specific firmware version, indicating that devices running this version or earlier are at risk. The lack of vendor response and patch availability increases the urgency for affected users to implement mitigations or consider device replacement.
Potential Impact
For European organizations using Belkin F9K1122 routers with firmware version 1.00.33, this vulnerability poses a risk of remote code execution that could compromise network perimeter security. Successful exploitation could allow attackers to execute arbitrary commands, potentially leading to unauthorized access, data exfiltration, network reconnaissance, or pivoting to internal systems. This could disrupt business operations, compromise sensitive data, and damage organizational reputation. Given that routers often serve as the first line of defense and gateway to internal networks, their compromise can have cascading effects on confidentiality, integrity, and availability of enterprise resources. Small and medium enterprises, as well as home office setups relying on this router model, may be particularly vulnerable due to limited IT security resources. The medium CVSS score reflects some mitigating factors such as limited scope and privileges, but the absence of authentication and user interaction requirements increases the threat level. The lack of a vendor patch further exacerbates the risk, necessitating immediate attention from security teams in affected organizations.
Mitigation Recommendations
1. Immediate mitigation should include isolating the affected Belkin F9K1122 devices from critical network segments to limit potential damage. 2. Disable remote management interfaces on the router to prevent external exploitation. 3. Restrict access to the router’s web interface to trusted internal IP addresses only, using firewall rules or access control lists. 4. Monitor network traffic for unusual activity or command execution attempts targeting the router’s management interface. 5. If possible, downgrade or upgrade the firmware to a version not affected by this vulnerability, although no patch is currently available; check regularly for vendor updates. 6. Consider replacing the affected devices with alternative routers from vendors with active security support. 7. Implement network segmentation to limit lateral movement if a router is compromised. 8. Educate IT staff about this vulnerability and ensure incident response plans include steps for router compromise scenarios. 9. Use network intrusion detection systems (NIDS) tuned to detect exploitation attempts targeting this vulnerability’s specific parameters.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-7082: OS Command Injection in Belkin F9K1122
Description
A vulnerability was found in Belkin F9K1122 1.00.33 and classified as critical. Affected by this issue is the function formBSSetSitesurvey of the file /goform/formBSSetSitesurvey of the component webs. The manipulation of the argument wan_ipaddr/wan_netmask/wan_gateway/wl_ssid is directly passed by the attacker/so we can control the wan_ipaddr/wan_netmask/wan_gateway/wl_ssid leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-7082 is a security vulnerability identified in the Belkin F9K1122 router firmware version 1.00.33. The flaw exists in the web component, specifically within the function formBSSetSitesurvey located at /goform/formBSSetSitesurvey. This function improperly handles user-supplied input parameters such as wan_ipaddr, wan_netmask, wan_gateway, and wl_ssid. An attacker can manipulate these parameters to inject arbitrary OS commands due to insufficient input validation and sanitization. This vulnerability enables remote attackers to execute commands on the underlying operating system with the privileges of the web service process. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. Although the CVSS v4.0 score is 5.3 (medium severity), the ability to execute OS commands remotely can lead to significant compromise depending on the context. The vendor, Belkin, was contacted but has not responded or issued a patch at the time of disclosure. No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation. The vulnerability affects a specific firmware version, indicating that devices running this version or earlier are at risk. The lack of vendor response and patch availability increases the urgency for affected users to implement mitigations or consider device replacement.
Potential Impact
For European organizations using Belkin F9K1122 routers with firmware version 1.00.33, this vulnerability poses a risk of remote code execution that could compromise network perimeter security. Successful exploitation could allow attackers to execute arbitrary commands, potentially leading to unauthorized access, data exfiltration, network reconnaissance, or pivoting to internal systems. This could disrupt business operations, compromise sensitive data, and damage organizational reputation. Given that routers often serve as the first line of defense and gateway to internal networks, their compromise can have cascading effects on confidentiality, integrity, and availability of enterprise resources. Small and medium enterprises, as well as home office setups relying on this router model, may be particularly vulnerable due to limited IT security resources. The medium CVSS score reflects some mitigating factors such as limited scope and privileges, but the absence of authentication and user interaction requirements increases the threat level. The lack of a vendor patch further exacerbates the risk, necessitating immediate attention from security teams in affected organizations.
Mitigation Recommendations
1. Immediate mitigation should include isolating the affected Belkin F9K1122 devices from critical network segments to limit potential damage. 2. Disable remote management interfaces on the router to prevent external exploitation. 3. Restrict access to the router’s web interface to trusted internal IP addresses only, using firewall rules or access control lists. 4. Monitor network traffic for unusual activity or command execution attempts targeting the router’s management interface. 5. If possible, downgrade or upgrade the firmware to a version not affected by this vulnerability, although no patch is currently available; check regularly for vendor updates. 6. Consider replacing the affected devices with alternative routers from vendors with active security support. 7. Implement network segmentation to limit lateral movement if a router is compromised. 8. Educate IT staff about this vulnerability and ensure incident response plans include steps for router compromise scenarios. 9. Use network intrusion detection systems (NIDS) tuned to detect exploitation attempts targeting this vulnerability’s specific parameters.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-05T15:24:21.743Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 686a83916f40f0eb72d4bf07
Added to database: 7/6/2025, 2:09:21 PM
Last enriched: 7/6/2025, 2:24:32 PM
Last updated: 7/6/2025, 6:43:21 PM
Views: 6
Related Threats
CVE-2025-7095: Improper Certificate Validation in Comodo Internet Security Premium
MediumCVE-2025-7094: Stack-based Buffer Overflow in Belkin F9K1122
HighCVE-2025-7093: Stack-based Buffer Overflow in Belkin F9K1122
HighCVE-2025-7092: Stack-based Buffer Overflow in Belkin F9K1122
HighThis Linux boot flaw bypasses Secure Boot and full disk encryption but the fix is easy
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.