Skip to main content

CVE-2025-7092: Stack-based Buffer Overflow in Belkin F9K1122

High
VulnerabilityCVE-2025-7092cvecve-2025-7092
Published: Sun Jul 06 2025 (07/06/2025, 20:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Belkin
Product: F9K1122

Description

A vulnerability has been found in Belkin F9K1122 1.00.33 and classified as critical. This vulnerability affects the function formWlanSetupWPS of the file /goform/formWlanSetupWPS of the component webs. The manipulation of the argument wps_enrolee_pin/webpage leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/06/2025, 20:24:30 UTC

Technical Analysis

CVE-2025-7092 is a critical stack-based buffer overflow vulnerability identified in the Belkin F9K1122 router, specifically affecting firmware version 1.00.33. The flaw resides in the function formWlanSetupWPS within the web server component handling the /goform/formWlanSetupWPS endpoint. The vulnerability is triggered by improper handling of the wps_enrolee_pin or webpage argument, allowing an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing the risk of widespread exploitation. Although the vendor was notified early, no response or patch has been provided, and a public exploit has been disclosed, raising the urgency for mitigation. The CVSS v4.0 base score is 8.7 (high severity), reflecting the ease of remote exploitation and the high impact on confidentiality, integrity, and availability. The vulnerability affects the web interface used for configuring WPS settings, a critical function for wireless network security. Exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, or disrupt network availability.

Potential Impact

For European organizations, this vulnerability poses significant risks. Belkin routers, including the F9K1122 model, are commonly used in small to medium-sized enterprises and home office environments across Europe. Successful exploitation could lead to unauthorized network access, data interception, or network disruption, impacting business continuity and data confidentiality. Given the remote exploitability without authentication, attackers could target vulnerable devices en masse, potentially creating botnets or launching further attacks within corporate networks. The lack of vendor response and patch availability increases exposure time, especially for organizations relying on this router model. Critical sectors such as finance, healthcare, and government entities using these devices could face severe operational and reputational damage if compromised. Additionally, the vulnerability could be leveraged for lateral movement within networks, escalating the threat beyond the initial device compromise.

Mitigation Recommendations

Immediate mitigation should focus on network-level controls and device management. Organizations should: 1) Identify and inventory all Belkin F9K1122 routers running firmware version 1.00.33. 2) Isolate affected devices from critical network segments and restrict remote access to the router's management interface using firewall rules or VPNs. 3) Disable WPS functionality if possible, as the vulnerability is tied to the WPS setup process. 4) Monitor network traffic for unusual activity or signs of exploitation attempts targeting the /goform/formWlanSetupWPS endpoint. 5) Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts. 6) Engage with Belkin support channels for updates or unofficial patches and consider replacing vulnerable devices with models from vendors with active security support. 7) Educate IT staff about the vulnerability and ensure incident response plans include steps for handling potential exploitation. These steps go beyond generic advice by focusing on immediate containment and compensating controls given the absence of an official patch.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-05T15:24:53.074Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686ad7f06f40f0eb72d6caab

Added to database: 7/6/2025, 8:09:20 PM

Last enriched: 7/6/2025, 8:24:30 PM

Last updated: 7/6/2025, 8:24:30 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats