Skip to main content

CVE-2025-7082: OS Command Injection in Belkin F9K1122

Medium
VulnerabilityCVE-2025-7082cvecve-2025-7082
Published: Sun Jul 06 2025 (07/06/2025, 14:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Belkin
Product: F9K1122

Description

A vulnerability was found in Belkin F9K1122 1.00.33 and classified as critical. Affected by this issue is the function formBSSetSitesurvey of the file /goform/formBSSetSitesurvey of the component webs. The manipulation of the argument wan_ipaddr/wan_netmask/wan_gateway/wl_ssid is directly passed by the attacker/so we can control the wan_ipaddr/wan_netmask/wan_gateway/wl_ssid leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/06/2025, 14:24:32 UTC

Technical Analysis

CVE-2025-7082 is a security vulnerability identified in the Belkin F9K1122 router firmware version 1.00.33. The flaw exists in the web component, specifically within the function formBSSetSitesurvey located at /goform/formBSSetSitesurvey. This function improperly handles user-supplied input parameters such as wan_ipaddr, wan_netmask, wan_gateway, and wl_ssid. An attacker can manipulate these parameters to inject arbitrary OS commands due to insufficient input validation and sanitization. This vulnerability enables remote attackers to execute commands on the underlying operating system with the privileges of the web service process. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. Although the CVSS v4.0 score is 5.3 (medium severity), the ability to execute OS commands remotely can lead to significant compromise depending on the context. The vendor, Belkin, was contacted but has not responded or issued a patch at the time of disclosure. No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation. The vulnerability affects a specific firmware version, indicating that devices running this version or earlier are at risk. The lack of vendor response and patch availability increases the urgency for affected users to implement mitigations or consider device replacement.

Potential Impact

For European organizations using Belkin F9K1122 routers with firmware version 1.00.33, this vulnerability poses a risk of remote code execution that could compromise network perimeter security. Successful exploitation could allow attackers to execute arbitrary commands, potentially leading to unauthorized access, data exfiltration, network reconnaissance, or pivoting to internal systems. This could disrupt business operations, compromise sensitive data, and damage organizational reputation. Given that routers often serve as the first line of defense and gateway to internal networks, their compromise can have cascading effects on confidentiality, integrity, and availability of enterprise resources. Small and medium enterprises, as well as home office setups relying on this router model, may be particularly vulnerable due to limited IT security resources. The medium CVSS score reflects some mitigating factors such as limited scope and privileges, but the absence of authentication and user interaction requirements increases the threat level. The lack of a vendor patch further exacerbates the risk, necessitating immediate attention from security teams in affected organizations.

Mitigation Recommendations

1. Immediate mitigation should include isolating the affected Belkin F9K1122 devices from critical network segments to limit potential damage. 2. Disable remote management interfaces on the router to prevent external exploitation. 3. Restrict access to the router’s web interface to trusted internal IP addresses only, using firewall rules or access control lists. 4. Monitor network traffic for unusual activity or command execution attempts targeting the router’s management interface. 5. If possible, downgrade or upgrade the firmware to a version not affected by this vulnerability, although no patch is currently available; check regularly for vendor updates. 6. Consider replacing the affected devices with alternative routers from vendors with active security support. 7. Implement network segmentation to limit lateral movement if a router is compromised. 8. Educate IT staff about this vulnerability and ensure incident response plans include steps for router compromise scenarios. 9. Use network intrusion detection systems (NIDS) tuned to detect exploitation attempts targeting this vulnerability’s specific parameters.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-05T15:24:21.743Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686a83916f40f0eb72d4bf07

Added to database: 7/6/2025, 2:09:21 PM

Last enriched: 7/6/2025, 2:24:32 PM

Last updated: 7/6/2025, 6:43:21 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats