CVE-2025-7094

8.8 HIGH

📋 TL;DR

A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary code by manipulating the submit-url-ok parameter in the formBSSetSitesurvey function. This affects all users of Belkin F9K1122 version 1.00.33 routers with the vulnerable firmware. Attackers can exploit this without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • Belkin F9K1122
Versions: 1.00.33
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the affected firmware version are vulnerable by default. The vulnerable component (webs) is typically enabled in standard configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to internal networks, installation of persistent malware, and creation of botnet nodes.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept network traffic, or use the device as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering, though internal exploitation remains possible.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and public exploit code exists, making internet-facing devices immediate targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability requires no authentication and can be exploited by any network-adjacent attacker.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exploit code is available on GitHub, making exploitation straightforward for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: Yes

Instructions:

No official patch available. Monitor Belkin's security advisories page for updates. If a patch becomes available, download from official Belkin support site and follow firmware update instructions.

🔧 Temporary Workarounds

Network Segmentation and Access Control

all

Isolate affected routers in separate network segments and restrict access to management interfaces

Disable Remote Management

all

Turn off remote management features if enabled

🧯 If You Can't Patch

  • Replace affected devices with supported models from vendors providing security updates
  • Implement strict network segmentation to isolate vulnerable routers from critical assets

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface (typically under Advanced > Administration > Firmware Update) or via SSH if enabled: cat /proc/version

Check Version:

Check web interface or use: ssh admin@router-ip 'cat /proc/version' (if SSH enabled)

Verify Fix Applied:

Verify firmware version is no longer 1.00.33. Check that no newer vulnerable versions exist.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/formBSSetSitesurvey
  • Large or malformed submit-url-ok parameter values
  • Router crash or reboot logs

Network Indicators:

  • HTTP POST requests to router IP on port 80/443 with formBSSetSitesurvey endpoint
  • Unusual outbound connections from router after exploitation

SIEM Query:

source="router_logs" AND (uri="/goform/formBSSetSitesurvey" OR uri CONTAINS "formBSSetSitesurvey")

🔗 References

📤 Share & Export