CVE-2025-7092

8.8 HIGH

📋 TL;DR

A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary code by manipulating the wps_enrolee_pin/webpage parameter. This affects users of Belkin F9K1122 routers running firmware version 1.00.33. The vulnerability is remotely exploitable without authentication.

💻 Affected Systems

Products:
  • Belkin F9K1122
Versions: 1.00.33
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component; WPS functionality must be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network infiltration, and persistent backdoor installation.

🟠

Likely Case

Router takeover enabling traffic interception, credential theft, and lateral movement into connected networks.

🟢

If Mitigated

Denial of service or limited information disclosure if exploit fails or is partially mitigated.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects internet-facing router web interfaces.
🏢 Internal Only: MEDIUM - Could be exploited from internal networks if router web interface is accessible.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available; vendor unresponsive; remote exploitation without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

No official patch available. Check Belkin website for firmware updates. If update exists: 1. Download firmware from Belkin support site. 2. Access router admin interface. 3. Navigate to firmware update section. 4. Upload and apply new firmware. 5. Reboot router.

🔧 Temporary Workarounds

Disable WPS and web interface access

all

Disable WPS functionality and restrict access to router web interface

Access router admin interface > Wireless settings > Disable WPS
Firewall rules to block external access to router web ports (typically 80/443)

Network segmentation and access control

all

Isolate router management interface and restrict access

Create separate VLAN for router management
Implement ACLs to restrict access to router IP from trusted networks only

🧯 If You Can't Patch

  • Replace affected routers with supported models from different vendors
  • Implement network monitoring and intrusion detection for exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface or command: telnet [router_ip] (if enabled) and check version

Check Version:

Access router web interface at http://[router_ip] and check firmware version in admin section

Verify Fix Applied:

Verify firmware version is no longer 1.00.33; test WPS functionality is disabled or patched

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed WPS connection attempts
  • Unusual POST requests to /goform/formWlanSetupWPS
  • Buffer overflow patterns in web server logs

Network Indicators:

  • Exploit traffic patterns to router web interface
  • Unusual outbound connections from router after compromise

SIEM Query:

source="router_logs" AND (uri="/goform/formWlanSetupWPS" OR message="*buffer overflow*")

🔗 References

📤 Share & Export