CVE Alert: CVE-2025-11301 – Belkin – F9K1015

CVE-2025-11301

HIGHNo exploitation known

A weakness has been identified in Belkin F9K1015 1.00.10. This affects an unknown function of the file /goform/formWlanSetupWPS. This manipulation of the argument webpage causes buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS v3.1 (8.8)
Vendor
Belkin
Product
F9K1015
Versions
1.00.10
CWE
CWE-120, Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Published
2025-10-05T19:32:05.383Z
Updated
2025-10-05T19:32:05.383Z

AI Summary Analysis

Risk verdict

High risk: remote code execution is possible over the network with low attacker privileges, and a public exploit exists.

Why this matters

Compromise of a consumer/SMB router can give an attacker control of the device and potential access to the LAN, enabling data exfiltration or pivoting to connected hosts. The combination of a high CVSS base and a publicly available exploit increases the likelihood of opportunistic attacks, especially where devices are exposed to the internet or misconfigured management interfaces remain enabled.

Most likely attack path

An attacker on the network sends a crafted request to the WPS-related endpoint, exploiting a buffer overflow to achieve code execution. The exploit does not require user interaction but relies on existing low privileges on the target, with network access as the delivery channel. If successful, the attacker gains control of the router, enabling further network access or persistence and potential lateral movement to LAN devices.

Who is most exposed

Primarily consumer and small-office routers with WPS/remote management enabled or exposed to the internet, and devices with outdated firmware lacking mitigations.

Detection ideas

  • Anomalous or oversized requests to the WPS endpoint (/goform/formWlanSetupWPS).
  • Router reboots or memory/CPU spikes following such requests.
  • Logs showing failed or unusual WPS configuration changes or crashes.
  • IDS signatures or indicators referencing the PoC patterns for this endpoint.
  • Increased failed admin login attempts from external sources.

Mitigation and prioritisation

  • Apply vendor firmware fixes; if unavailable, disable WPS and restrict admin access to the LAN; block WAN management where feasible.
  • Enforce strong admin credentials and disable remote management exposure.
  • Implement network segmentation and monitor for unexpected WPS-related configuration changes.
  • Change-management: test patch in a controlled environment before wide rollout; verify logs for related indicators.
  • If KEV is present or EPSS ≥ 0.5, treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.