CVE Alert: CVE-2025-11299 – Belkin – F9K1015

CVE-2025-11299

HIGHNo exploitation known

A vulnerability was identified in Belkin F9K1015 1.00.10. The affected element is an unknown function of the file /goform/formWanTcpipSetup. The manipulation of the argument pppUserName leads to buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS v3.1 (8.8)
Vendor
Belkin
Product
F9K1015
Versions
1.00.10
CWE
CWE-120, Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Published
2025-10-05T18:32:05.591Z
Updated
2025-10-05T18:32:05.591Z

AI Summary Analysis

Risk verdict

High risk: remote code execution with a public proof-of-concept, no user interaction required, and exploitability over the network.

Why this matters

Successful exploitation could allow an attacker to take control of the device, disrupt connectivity, or pivot into the internal network. Given the high impact on confidentiality, integrity, and availability, unauthorised access to home or small-business networks is plausible if unpatched.

Most likely attack path

Attacker can exploit via a network vector to trigger a buffer overflow in the formWanTcpipSetup flow, requiring only low privileges on the device and no UI interaction. Exploitation could crash services or enable arbitrary code execution, with potential lateral movement within the LAN if the router acts as a gateway, and if persistent access is achieved.

Who is most exposed

Primarily consumer and small-office routers running affected Belkin firmware; devices exposed to WAN management interfaces or exposed web administration beyond the local network are at greatest risk.

Detection ideas

  • Unusual, crafted requests to /goform/formWanTcpipSetup (pppUserName parameter) observed in web traffic.
  • Unexpected device crashes or reboots and elevated memory usage.
  • Anomalous login attempts or new admin sessions from external IPs.
  • Sudden changes in router WAN/LAN configuration or DNS settings.
  • Logs showing failed attempts followed by successful over-range requests.

Mitigation and prioritisation

  • Apply latest Belkin firmware once released; verify remediation advisory and test in staging before production rollout.
  • Disable or restrict WAN management and remote administration; enforce access from trusted networks only.
  • Implement network segmentation and tighten firewall policies around the router management interface.
  • Disable UPnP where feasible; review and rotate administrative credentials.
  • Schedule patching with change-management approval; monitor for exploitation attempts and reinforce monitoring.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.