CVE-2025-7092: Stack-based Buffer Overflow in Belkin F9K1122
A vulnerability has been found in Belkin F9K1122 1.00.33 and classified as critical. This vulnerability affects the function formWlanSetupWPS of the file /goform/formWlanSetupWPS of the component webs. The manipulation of the argument wps_enrolee_pin/webpage leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-7092 is a critical stack-based buffer overflow vulnerability identified in the Belkin F9K1122 router, specifically affecting firmware version 1.00.33. The flaw resides in the function formWlanSetupWPS within the web server component handling the /goform/formWlanSetupWPS endpoint. The vulnerability is triggered by improper handling of the wps_enrolee_pin or webpage argument, allowing an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing the risk of widespread exploitation. Although the vendor was notified early, no response or patch has been provided, and a public exploit has been disclosed, raising the urgency for mitigation. The CVSS v4.0 base score is 8.7 (high severity), reflecting the ease of remote exploitation and the high impact on confidentiality, integrity, and availability. The vulnerability affects the web interface used for configuring WPS settings, a critical function for wireless network security. Exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, or disrupt network availability.
Potential Impact
For European organizations, this vulnerability poses significant risks. Belkin routers, including the F9K1122 model, are commonly used in small to medium-sized enterprises and home office environments across Europe. Successful exploitation could lead to unauthorized network access, data interception, or network disruption, impacting business continuity and data confidentiality. Given the remote exploitability without authentication, attackers could target vulnerable devices en masse, potentially creating botnets or launching further attacks within corporate networks. The lack of vendor response and patch availability increases exposure time, especially for organizations relying on this router model. Critical sectors such as finance, healthcare, and government entities using these devices could face severe operational and reputational damage if compromised. Additionally, the vulnerability could be leveraged for lateral movement within networks, escalating the threat beyond the initial device compromise.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls and device management. Organizations should: 1) Identify and inventory all Belkin F9K1122 routers running firmware version 1.00.33. 2) Isolate affected devices from critical network segments and restrict remote access to the router's management interface using firewall rules or VPNs. 3) Disable WPS functionality if possible, as the vulnerability is tied to the WPS setup process. 4) Monitor network traffic for unusual activity or signs of exploitation attempts targeting the /goform/formWlanSetupWPS endpoint. 5) Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts. 6) Engage with Belkin support channels for updates or unofficial patches and consider replacing vulnerable devices with models from vendors with active security support. 7) Educate IT staff about the vulnerability and ensure incident response plans include steps for handling potential exploitation. These steps go beyond generic advice by focusing on immediate containment and compensating controls given the absence of an official patch.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-7092: Stack-based Buffer Overflow in Belkin F9K1122
Description
A vulnerability has been found in Belkin F9K1122 1.00.33 and classified as critical. This vulnerability affects the function formWlanSetupWPS of the file /goform/formWlanSetupWPS of the component webs. The manipulation of the argument wps_enrolee_pin/webpage leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-7092 is a critical stack-based buffer overflow vulnerability identified in the Belkin F9K1122 router, specifically affecting firmware version 1.00.33. The flaw resides in the function formWlanSetupWPS within the web server component handling the /goform/formWlanSetupWPS endpoint. The vulnerability is triggered by improper handling of the wps_enrolee_pin or webpage argument, allowing an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing the risk of widespread exploitation. Although the vendor was notified early, no response or patch has been provided, and a public exploit has been disclosed, raising the urgency for mitigation. The CVSS v4.0 base score is 8.7 (high severity), reflecting the ease of remote exploitation and the high impact on confidentiality, integrity, and availability. The vulnerability affects the web interface used for configuring WPS settings, a critical function for wireless network security. Exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, or disrupt network availability.
Potential Impact
For European organizations, this vulnerability poses significant risks. Belkin routers, including the F9K1122 model, are commonly used in small to medium-sized enterprises and home office environments across Europe. Successful exploitation could lead to unauthorized network access, data interception, or network disruption, impacting business continuity and data confidentiality. Given the remote exploitability without authentication, attackers could target vulnerable devices en masse, potentially creating botnets or launching further attacks within corporate networks. The lack of vendor response and patch availability increases exposure time, especially for organizations relying on this router model. Critical sectors such as finance, healthcare, and government entities using these devices could face severe operational and reputational damage if compromised. Additionally, the vulnerability could be leveraged for lateral movement within networks, escalating the threat beyond the initial device compromise.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls and device management. Organizations should: 1) Identify and inventory all Belkin F9K1122 routers running firmware version 1.00.33. 2) Isolate affected devices from critical network segments and restrict remote access to the router's management interface using firewall rules or VPNs. 3) Disable WPS functionality if possible, as the vulnerability is tied to the WPS setup process. 4) Monitor network traffic for unusual activity or signs of exploitation attempts targeting the /goform/formWlanSetupWPS endpoint. 5) Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts. 6) Engage with Belkin support channels for updates or unofficial patches and consider replacing vulnerable devices with models from vendors with active security support. 7) Educate IT staff about the vulnerability and ensure incident response plans include steps for handling potential exploitation. These steps go beyond generic advice by focusing on immediate containment and compensating controls given the absence of an official patch.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-05T15:24:53.074Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 686ad7f06f40f0eb72d6caab
Added to database: 7/6/2025, 8:09:20 PM
Last enriched: 7/6/2025, 8:24:30 PM
Last updated: 7/6/2025, 8:24:30 PM
Views: 2
Related Threats
CVE-2025-7095: Improper Certificate Validation in Comodo Internet Security Premium
MediumCVE-2025-7094: Stack-based Buffer Overflow in Belkin F9K1122
HighCVE-2025-7093: Stack-based Buffer Overflow in Belkin F9K1122
HighCVE-2025-7091: Stack-based Buffer Overflow in Belkin F9K1122
HighCVE-2025-7090: Stack-based Buffer Overflow in Belkin F9K1122
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.