CVE Alert: CVE-2025-11302 – Belkin – F9K1015

CVE-2025-11302

HIGHNo exploitation known

A security vulnerability has been detected in Belkin F9K1015 1.00.10. This impacts an unknown function of the file /goform/formWpsStart. Such manipulation of the argument pinCode leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS v3.1 (8.8)
Vendor
Belkin
Product
F9K1015
Versions
1.00.10
CWE
CWE-120, Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Published
2025-10-05T20:02:05.950Z
Updated
2025-10-05T20:02:05.950Z

AI Summary Analysis

Risk verdict

High risk: remote code execution is possible with network access, requires only low privileges and no user interaction, and a public exploit exists.

Why this matters

Consumer Belkin F9K1015 devices are widely deployed; compromise could yield full device control, traffic interception, and persistence within home networks. The public nature of the exploit increases the chance of automated attempts and rapid weaponisation, potentially enabling lateral movement to other connected devices.

Most likely attack path

An attacker targets the device’s management surface exposed to the network, sending a crafted payload to the formWpsStart endpoint to trigger a buffer overflow. With AV:N and UI:N the attack can be automated and requires only low privileges, making remote exploitation feasible without user interaction. If successful, attacker gains high-impact access (C/H I/H A/H) and may pivot to other devices on the LAN.

Who is most exposed

Often seen in consumer routers deployed in homes or small offices with WAN-facing admin interfaces or enabled WPS features. Systems with remote management and WPS enabled are particularly at risk, especially if firmware lacks timely updates.

Detection ideas

  • Monitor for anomalous requests to /goform/formWpsStart, especially unusual pinCode values.
  • Look for device reboots/crashes and memory corruption indicators following such requests.
  • IDS/IPS alerts for known signatures or CTI IOC patterns related to this vulnerability.
  • Unusual spikes in CPU/memory tied to management traffic.
  • Correlation of remote management access logs with subsequent instability.

Mitigation and prioritisation

  • Apply vendor firmware update to the fixed release (e.g., newer than 1.00.10); verify patch applicability.
  • If patching is not immediate: disable remote WAN management and WPS; restrict admin UI to LAN only; disable UPnP; tighten firewall rules.
  • Block or rate-limit access to the affected endpoint; enforce network segmentation of IoT devices.
  • Enable automatic updates where possible; establish a maintenance window for firmware rollouts.
  • Validate changes with regression tests on the device’s web interface and WPS functionality.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.