No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 06 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Belkin F9K1122 formWlanSetup stack-based overflow | |
| First Time appeared |
Belkin
Belkin f9k1122 Firmware |
|
| Weaknesses | CWE-119 CWE-121 |
|
| CPEs | cpe:2.3:o:belkin:f9k1122_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Belkin
Belkin f9k1122 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-06T14:50:03.283Z
Reserved: 2026-04-05T15:22:23.478Z
Link: CVE-2026-5608
Updated: 2026-04-06T14:41:49.360Z
Status : Received
Published: 2026-04-06T01:16:40.367
Modified: 2026-04-06T01:16:40.367
Link: CVE-2026-5608
No data.
OpenCVE Enrichment
No data.