Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4566: Stack-based Buffer Overflow in Belkin F9K1122

0
High
VulnerabilityCVE-2026-4566cvecve-2026-4566
Published: Mon Mar 23 2026 (03/23/2026, 01:30:07 UTC)
Source: CVE Database V5
Vendor/Project: Belkin
Product: F9K1122

Description

CVE-2026-4566 is a high-severity stack-based buffer overflow vulnerability in the Belkin F9K1122 router, specifically in the formWISP5G function within the /goform/formWISP5G endpoint. The flaw allows a remote attacker to manipulate the 'webpage' argument to trigger a buffer overflow without requiring user interaction or authentication. Exploit code has been published, increasing the risk of exploitation, although no active exploits have been reported in the wild yet. The vulnerability affects firmware version 1. 00. 33, and the vendor has not responded to disclosure attempts. Successful exploitation could lead to remote code execution with high impact on confidentiality, integrity, and availability. Organizations using this router model are at risk, especially those with devices exposed to untrusted networks. Immediate mitigation steps are critical given the exploitability and severity of the flaw.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 02:46:12 UTC

Technical Analysis

CVE-2026-4566 identifies a stack-based buffer overflow vulnerability in the Belkin F9K1122 router firmware version 1.00.33. The vulnerability resides in the formWISP5G function, which processes requests to the /goform/formWISP5G endpoint. Specifically, the 'webpage' argument is improperly handled, allowing an attacker to supply crafted input that overflows the stack buffer. This overflow can corrupt the stack frame, potentially enabling arbitrary code execution on the device. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS v4.0 score is 8.7, reflecting the ease of exploitation (network vector, low complexity) and the high impact on confidentiality, integrity, and availability. Although no active exploits have been observed in the wild, proof-of-concept exploit code has been published, increasing the likelihood of future attacks. The vendor has not issued a patch or responded to disclosure, leaving affected devices vulnerable. This flaw could be leveraged to gain persistent control over the router, intercept or manipulate network traffic, or launch further attacks within the network environment.

Potential Impact

The impact of CVE-2026-4566 is significant for organizations using the Belkin F9K1122 router, particularly those with devices exposed to the internet or untrusted networks. Successful exploitation can lead to remote code execution, allowing attackers to take full control of the device. This compromises the confidentiality of network traffic, integrity of data passing through the router, and availability of network services. Attackers could use the compromised router as a foothold for lateral movement within corporate networks or as a platform for launching attacks against other targets. The lack of vendor response and patch availability prolongs exposure, increasing the risk of widespread exploitation. Small and medium enterprises, home offices, and possibly some larger organizations relying on this router model are at risk. The vulnerability also threatens the security of connected IoT devices and sensitive data traversing the network.

Mitigation Recommendations

Given the absence of an official patch from Belkin, organizations should immediately implement compensating controls. First, isolate affected routers from untrusted networks by restricting inbound access to the /goform/formWISP5G endpoint using firewall rules or network segmentation. Disable remote management features if enabled. Monitor network traffic for unusual activity indicative of exploitation attempts targeting this vulnerability. Replace or upgrade affected devices to models with updated firmware once available. If possible, apply custom firmware or third-party patches that address the buffer overflow. Conduct regular vulnerability scanning to identify exposed devices. Educate users and administrators about the risk and signs of compromise. Maintain robust network monitoring and incident response capabilities to quickly detect and respond to exploitation attempts. Finally, advocate for vendor accountability and timely patch releases through coordinated disclosure channels.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-22T08:31:26.455Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c0a5dbf4197a8e3bdb4a81

Added to database: 3/23/2026, 2:30:51 AM

Last enriched: 3/23/2026, 2:46:12 AM

Last updated: 3/23/2026, 4:46:23 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses