CVE-2025-7084

8.8 HIGH

📋 TL;DR

A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary code by manipulating the pinCode parameter in the formWpsStart function. This affects Belkin F9K1122 routers running firmware version 1.00.33. Attackers can exploit this without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • Belkin F9K1122
Versions: 1.00.33
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected. The webs component is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to internal networks, persistent backdoor installation, and data exfiltration.

🟠

Likely Case

Device takeover enabling network traffic interception, DNS hijacking, credential theft, and participation in botnets.

🟢

If Mitigated

Limited impact if device is isolated, but still vulnerable to denial of service or limited data exposure.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects internet-facing router interfaces.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access, but external exposure is the primary concern.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept code is publicly available on GitHub. The vulnerability requires no authentication and has straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

1. Check Belkin website for firmware updates. 2. If update available, download and install following vendor instructions. 3. Reboot device after installation. Note: No official patch is currently known.

🔧 Temporary Workarounds

Disable WPS functionality

all

Disable Wi-Fi Protected Setup (WPS) feature to prevent access to the vulnerable endpoint

Network segmentation

all

Isolate affected routers in separate network segments to limit potential lateral movement

🧯 If You Can't Patch

  • Replace affected devices with non-vulnerable models
  • Implement strict network access controls and firewall rules to block external access to router management interfaces

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface at http://routerlogin.net or http://192.168.1.1. Navigate to Advanced > Administration > Firmware Update.

Check Version:

curl -s http://192.168.1.1/ | grep -i firmware or check web interface

Verify Fix Applied:

Verify firmware version is no longer 1.00.33. Check that WPS functionality is disabled if using workaround.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/formWpsStart
  • Multiple failed WPS attempts
  • Unexpected device reboots or crashes

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting command and control communication
  • Port scanning originating from router

SIEM Query:

source="router.log" AND (uri="/goform/formWpsStart" OR message="WPS" OR message="buffer overflow")

🔗 References

📤 Share & Export