CVE-2025-8730
📋 TL;DR
This critical vulnerability in Belkin routers allows attackers to use hard-coded credentials to gain unauthorized access to the web interface. Affected devices are Belkin F9K1009 and F9K1010 routers running vulnerable firmware versions. The attack can be launched remotely without authentication.
💻 Affected Systems
- Belkin F9K1009
- Belkin F9K1010
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of router with ability to modify network settings, intercept traffic, install malware, and pivot to internal network devices.
Likely Case
Unauthorized access to router administration panel leading to network configuration changes, DNS hijacking, and credential theft.
If Mitigated
Limited impact if devices are behind firewalls with strict inbound rules and network segmentation.
🎯 Exploit Status
Exploit details are publicly available in GitHub repositories showing hard-coded credentials.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: Yes
Instructions:
No official patch available. Contact Belkin support for firmware updates or replacement options.
🔧 Temporary Workarounds
Network Isolation
allPlace affected routers behind firewalls with strict inbound rules to block external access to web interface.
Disable Remote Management
allTurn off remote administration features in router settings if available.
🧯 If You Can't Patch
- Replace affected routers with different models or brands that receive security updates
- Implement network segmentation to isolate affected routers from critical systems
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in web interface under Administration > Firmware Update. If version is 2.00.04 or 2.00.09, device is vulnerable.
Check Version:
No CLI command. Check via web interface at http://[router-ip]/
Verify Fix Applied:
Verify firmware version has been updated to a version later than 2.00.09 (when available).
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful login
- Administrative configuration changes from unexpected IP addresses
- Login events using default or hard-coded credentials
Network Indicators:
- External IP addresses accessing router administration ports (typically 80/443)
- Unusual outbound connections from router to external IPs
SIEM Query:
source="router_logs" AND (event="login_success" AND user="admin" OR event="config_change")
🔗 References
- https://github.com/Nicholas-wei/bug-discovery/blob/main/belkin/F9K1009_WW_2.00.09/belkin%20F9K1009_WW_2.00.09_hardcoded_credential.pdf
- https://github.com/Nicholas-wei/bug-discovery/blob/main/belkin/F9K1010_WW_2.00.04/belkin_F9K1010_WW_2.00.04_hardcoded_credential.pdf
- https://vuldb.com/?ctiid.319226
- https://vuldb.com/?id.319226
- https://vuldb.com/?submit.621747
- https://vuldb.com/?submit.621748
- https://vuldb.com/?submit.621760