Описание
A vulnerability was identified in Belkin F9K1015 1.00.10. The affected element is an unknown function of the file /goform/formWanTcpipSetup. The manipulation of the argument pppUserName leads to buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was identified in Belkin F9K1015 1.00.10. The affected element is an unknown function of the file /goform/formWanTcpipSetup. The manipulation of the argument pppUserName leads to buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-11299
- https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formWanTcpipSetup.md
- https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formWanTcpipSetup.md#poc
- https://vuldb.com/?ctiid.327180
- https://vuldb.com/?id.327180
- https://vuldb.com/?submit.661303
Связанные уязвимости
A vulnerability was identified in Belkin F9K1015 1.00.10. The affected element is an unknown function of the file /goform/formWanTcpipSetup. The manipulation of the argument pppUserName leads to buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Уязвимость функции formWanTcpipSetup() файла /goform/formWanTcpipSetup микропрограммного обеспечения маршрутизаторов Belkin F9K1015, позволяющая нарушителю выполнить произвольный код