Skip to main content

CVE-2025-7091: Stack-based Buffer Overflow in Belkin F9K1122

High
VulnerabilityCVE-2025-7091cvecve-2025-7091
Published: Sun Jul 06 2025 (07/06/2025, 19:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Belkin
Product: F9K1122

Description

A vulnerability was found in Belkin F9K1122 1.00.33. It has been classified as critical. Affected is the function formWlanMP of the file /goform/formWlanMP of the component webs. The manipulation of the argument ateFunc/ateGain/ateTxCount/ateChan/ateRate/ateMacID/e2pTxPower1/e2pTxPower2/e2pTxPower3/e2pTxPower4/e2pTxPower5/e2pTxPower6/e2pTxPower7/e2pTx2Power1/e2pTx2Power2/e2pTx2Power3/e2pTx2Power4/e2pTx2Power5/e2pTx2Power6/e2pTx2Power7/ateTxFreqOffset/ateMode/ateBW/ateAntenna/e2pTxFreqOffset/e2pTxPwDeltaB/e2pTxPwDeltaG/e2pTxPwDeltaMix/e2pTxPwDeltaN/readE2P leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/06/2025, 19:54:38 UTC

Technical Analysis

CVE-2025-7091 is a critical stack-based buffer overflow vulnerability identified in the Belkin F9K1122 router, specifically affecting firmware version 1.00.33. The vulnerability resides in the formWlanMP function within the /goform/formWlanMP component of the device's web interface. This function processes multiple parameters related to wireless configuration such as ateFunc, ateGain, ateTxCount, ateChan, ateRate, ateMacID, and various e2pTxPower and ateTxFreqOffset parameters. Improper handling and validation of these inputs allow an attacker to overflow a stack buffer, potentially overwriting adjacent memory and enabling arbitrary code execution. The vulnerability can be exploited remotely without authentication or user interaction, as it is triggered via crafted HTTP requests to the vulnerable web endpoint. The CVSS 4.0 base score is 8.7, indicating a high severity level, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no public exploits have been observed in the wild yet, the exploit code has been disclosed publicly, increasing the risk of exploitation. The vendor was notified early but has not responded or released patches, leaving devices exposed. This vulnerability poses a significant risk to the security posture of affected devices, enabling remote attackers to gain control over the router, manipulate network traffic, or disrupt network availability.

Potential Impact

For European organizations, this vulnerability presents a substantial risk, especially for those relying on Belkin F9K1122 routers in their network infrastructure. Successful exploitation could lead to full compromise of the router, allowing attackers to intercept or redirect sensitive communications, launch man-in-the-middle attacks, or pivot into internal networks. This jeopardizes confidentiality of corporate data, integrity of network operations, and availability of critical services. Small and medium enterprises, as well as home office setups using this device, may be particularly vulnerable due to limited IT security resources and delayed patching. The lack of vendor response and patches exacerbates the threat, potentially leading to increased exploitation attempts. Additionally, compromised routers could be leveraged as part of botnets or for launching further attacks against European targets, amplifying the impact beyond individual organizations.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. These include isolating affected Belkin F9K1122 devices from critical network segments and restricting access to their web management interfaces via firewall rules or network segmentation. Disabling remote management features and changing default credentials can reduce exposure. Monitoring network traffic for unusual patterns or unexpected HTTP requests targeting /goform/formWlanMP can help detect exploitation attempts. Organizations should consider replacing vulnerable devices with alternative routers from vendors with active security support. Additionally, deploying intrusion detection/prevention systems (IDS/IPS) configured to identify exploitation signatures related to this vulnerability can provide proactive defense. Regular security awareness training to inform users about risks associated with unmanaged or outdated network devices is also recommended. Finally, organizations should maintain close monitoring of vendor communications for any forthcoming patches or advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-05T15:24:49.797Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686ad0e96f40f0eb72d6b993

Added to database: 7/6/2025, 7:39:21 PM

Last enriched: 7/6/2025, 7:54:38 PM

Last updated: 7/6/2025, 9:18:05 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats