CVE-2025-7084: Stack-based Buffer Overflow in Belkin F9K1122
A vulnerability was found in Belkin F9K1122 1.00.33. It has been declared as critical. This vulnerability affects the function formWpsStart of the file /goform/formWpsStart of the component webs. The manipulation of the argument pinCode leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-7084 is a critical stack-based buffer overflow vulnerability identified in the Belkin F9K1122 router, specifically in firmware version 1.00.33. The flaw exists in the function formWpsStart within the web component handling the /goform/formWpsStart endpoint. The vulnerability arises from improper handling of the 'pinCode' argument, which can be manipulated by an attacker to overflow the stack buffer. This type of overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it particularly dangerous. The CVSS v4.0 base score is 8.7, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although the vendor was notified early, there has been no response or patch released, and a public exploit has been disclosed, increasing the risk of exploitation in the wild. The lack of vendor response and patch availability means affected devices remain vulnerable, and attackers can leverage this flaw to gain control over the router, intercept or manipulate network traffic, or disrupt network services.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Belkin F9K1122 routers in their network infrastructure. Successful exploitation could allow attackers to execute arbitrary code on the device, potentially leading to full compromise of the router. This could enable interception of sensitive data, man-in-the-middle attacks, or lateral movement within the network. The disruption of router availability could also impact business continuity, particularly for small and medium enterprises that may use consumer-grade routers like the F9K1122. Given the router’s role as a network gateway, the compromise could undermine the confidentiality, integrity, and availability of organizational data and communications. The absence of a patch and the public availability of exploits heighten the urgency for mitigation. Additionally, the vulnerability could be leveraged in botnet campaigns or as a foothold for further attacks targeting European entities.
Mitigation Recommendations
Organizations should immediately identify any deployments of Belkin F9K1122 routers running firmware version 1.00.33. Since no official patch is available, mitigation should focus on network-level controls: isolate affected devices from critical network segments, restrict remote access to the router’s management interface, and implement strict firewall rules to block unauthorized inbound traffic to the router’s web management ports. Disabling WPS functionality, if possible, may reduce attack surface. Network monitoring should be enhanced to detect unusual traffic patterns or signs of exploitation attempts targeting the /goform/formWpsStart endpoint. Where feasible, replace affected devices with alternative routers from vendors with active security support. Additionally, organizations should maintain up-to-date asset inventories and apply network segmentation to limit the impact of compromised devices. Finally, engage with Belkin support channels to seek updates or advisories and monitor vulnerability databases for any forthcoming patches or mitigations.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland
CVE-2025-7084: Stack-based Buffer Overflow in Belkin F9K1122
Description
A vulnerability was found in Belkin F9K1122 1.00.33. It has been declared as critical. This vulnerability affects the function formWpsStart of the file /goform/formWpsStart of the component webs. The manipulation of the argument pinCode leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-7084 is a critical stack-based buffer overflow vulnerability identified in the Belkin F9K1122 router, specifically in firmware version 1.00.33. The flaw exists in the function formWpsStart within the web component handling the /goform/formWpsStart endpoint. The vulnerability arises from improper handling of the 'pinCode' argument, which can be manipulated by an attacker to overflow the stack buffer. This type of overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it particularly dangerous. The CVSS v4.0 base score is 8.7, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although the vendor was notified early, there has been no response or patch released, and a public exploit has been disclosed, increasing the risk of exploitation in the wild. The lack of vendor response and patch availability means affected devices remain vulnerable, and attackers can leverage this flaw to gain control over the router, intercept or manipulate network traffic, or disrupt network services.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Belkin F9K1122 routers in their network infrastructure. Successful exploitation could allow attackers to execute arbitrary code on the device, potentially leading to full compromise of the router. This could enable interception of sensitive data, man-in-the-middle attacks, or lateral movement within the network. The disruption of router availability could also impact business continuity, particularly for small and medium enterprises that may use consumer-grade routers like the F9K1122. Given the router’s role as a network gateway, the compromise could undermine the confidentiality, integrity, and availability of organizational data and communications. The absence of a patch and the public availability of exploits heighten the urgency for mitigation. Additionally, the vulnerability could be leveraged in botnet campaigns or as a foothold for further attacks targeting European entities.
Mitigation Recommendations
Organizations should immediately identify any deployments of Belkin F9K1122 routers running firmware version 1.00.33. Since no official patch is available, mitigation should focus on network-level controls: isolate affected devices from critical network segments, restrict remote access to the router’s management interface, and implement strict firewall rules to block unauthorized inbound traffic to the router’s web management ports. Disabling WPS functionality, if possible, may reduce attack surface. Network monitoring should be enhanced to detect unusual traffic patterns or signs of exploitation attempts targeting the /goform/formWpsStart endpoint. Where feasible, replace affected devices with alternative routers from vendors with active security support. Additionally, organizations should maintain up-to-date asset inventories and apply network segmentation to limit the impact of compromised devices. Finally, engage with Belkin support channels to seek updates or advisories and monitor vulnerability databases for any forthcoming patches or mitigations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-05T15:24:26.861Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 686aa3356f40f0eb72d523a7
Added to database: 7/6/2025, 4:24:21 PM
Last enriched: 7/6/2025, 4:39:32 PM
Last updated: 7/7/2025, 9:56:47 PM
Views: 9
Related Threats
CVE-2025-7172: SQL Injection in code-projects Crime Reporting System
MediumCVE-2025-6744: CWE-94 Improper Control of Generation of Code ('Code Injection') in xTemos Woodmart
HighCVE-2025-7171: SQL Injection in code-projects Crime Reporting System
MediumCVE-2025-7170: SQL Injection in code-projects Crime Reporting System
MediumCVE-2025-7169: SQL Injection in code-projects Crime Reporting System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.