Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5043: Stack-based Buffer Overflow in Belkin F9K1122

0
High
VulnerabilityCVE-2026-5043cvecve-2026-5043
Published: Sun Mar 29 2026 (03/29/2026, 11:15:10 UTC)
Source: CVE Database V5
Vendor/Project: Belkin
Product: F9K1122

Description

CVE-2026-5043 is a high-severity stack-based buffer overflow vulnerability in the Belkin F9K1122 router firmware version 1. 00. 33. The flaw exists in the formSetPassword function within the /goform/formSetPassword endpoint, which improperly handles input arguments, allowing remote attackers to overflow the stack. Exploitation does not require user interaction or authentication, making it remotely exploitable over the network. The vulnerability can lead to complete compromise of the device, including arbitrary code execution with elevated privileges. Although the vendor has been contacted, no patch or response has been issued, and a public exploit is available. This increases the risk of attacks targeting affected devices. Organizations using this router model should urgently assess exposure and apply mitigations to prevent exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/29/2026, 11:45:26 UTC

Technical Analysis

CVE-2026-5043 identifies a critical stack-based buffer overflow vulnerability in the Belkin F9K1122 router firmware version 1.00.33. The vulnerability resides in the formSetPassword function of the Parameter Handler component, specifically within the /goform/formSetPassword endpoint. This function improperly processes user-supplied input parameters, leading to a stack overflow condition when maliciously crafted arguments are sent. The flaw allows remote attackers to overwrite the stack memory, potentially enabling arbitrary code execution on the device with elevated privileges. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The vulnerability has been publicly disclosed with an exploit available, but Belkin has not responded or released a patch, leaving devices vulnerable. The CVSS v4.0 score is 8.7, reflecting high impact on confidentiality, integrity, and availability. The exploitability is high due to low complexity and no required privileges. This vulnerability threatens the security of affected routers by enabling attackers to gain full control, disrupt network operations, or pivot into internal networks.

Potential Impact

The impact of CVE-2026-5043 is severe for organizations using the Belkin F9K1122 router, as successful exploitation can lead to full device compromise. Attackers can execute arbitrary code remotely, potentially gaining administrative control over the router. This can result in interception or manipulation of network traffic, disruption of network availability, and use of the compromised device as a foothold for further attacks within the internal network. The lack of vendor response and patch increases the risk of widespread exploitation, especially since a public exploit is available. Organizations relying on this router model may face data breaches, service outages, and loss of network integrity. The vulnerability also poses risks to home users and small businesses that use this device, potentially exposing sensitive information and network resources.

Mitigation Recommendations

Given the absence of an official patch from Belkin, organizations should take immediate compensating controls. First, isolate the affected devices from untrusted networks, especially the internet, by placing them behind firewalls or disabling remote management interfaces. Restrict access to the /goform/formSetPassword endpoint by implementing network-level filtering or access control lists to block unauthorized requests. Monitor network traffic for unusual activity targeting the router’s management interface. If possible, replace the affected Belkin F9K1122 devices with alternative routers that have up-to-date firmware and security support. Regularly audit network devices for vulnerable firmware versions and maintain an inventory to quickly identify at-risk equipment. Additionally, consider deploying intrusion detection systems capable of recognizing exploit attempts targeting this vulnerability. Stay alert for any vendor updates or third-party patches and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-27T16:35:46.876Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c90d85919ccadcdf10f5d7

Added to database: 3/29/2026, 11:31:17 AM

Last enriched: 3/29/2026, 11:45:26 AM

Last updated: 3/29/2026, 12:31:58 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses