📦 F9k1122 Firmware

by Belkin

🔍 What is F9k1122 Firmware?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2025-7094

HIGH CVSS 8.8 Jul 6, 2025

A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary code by manipulating the submit-url-ok parameter in the formBSSetSitesurvey ...

CVE-2025-7092

HIGH CVSS 8.8 Jul 6, 2025

A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary code by manipulating the wps_enrolee_pin/webpage parameter. This affects use...

CVE-2025-7090

HIGH CVSS 8.8 Jul 6, 2025

A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary code by manipulating the max_Conn/timeOut parameter in the formConnectionSet...

CVE-2025-7088

HIGH CVSS 8.8 Jul 6, 2025

A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary code by manipulating the pppUserName parameter. This affects the router's we...

CVE-2025-7086

HIGH CVSS 8.8 Jul 6, 2025

A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary code by manipulating the pptpUserName parameter. This affects Belkin F9K1122...

CVE-2025-7084

HIGH CVSS 8.8 Jul 6, 2025

A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary code by manipulating the pinCode parameter in the formWpsStart function. Thi...

CVE-2025-7083

MEDIUM CVSS 6.3 Jul 6, 2025

This critical vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary operating system commands via command injection in the web interface. Attackers can exploit this to t...

CVE-2025-7081

MEDIUM CVSS 6.3 Jul 6, 2025

CVE-2025-7081 is a critical OS command injection vulnerability in Belkin F9K1122 routers that allows remote attackers to execute arbitrary commands by manipulating WAN configuration parameters. This a...