CVE-2025-11299
Belkin F9K1015 formWanTcpipSetup buffer overflow
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was identified in Belkin F9K1015 1.00.10. The affected element is an unknown function of the file /goform/formWanTcpipSetup. The manipulation of the argument pppUserName leads to buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
| CWE | CWE-120 CWE-119 |
| Vendor | belkin |
| Product | f9k1015 |
| Published | Oct 5, 2025 |
| Last Updated | Feb 24, 2026 |
Stay Ahead of the Next One
Get instant alerts for belkin f9k1015
Be the first to know when new high vulnerabilities affecting belkin f9k1015 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Belkin / F9K1015
1.00.10
References
vuldb.com: https://vuldb.com/?id.327180 vuldb.com: https://vuldb.com/?ctiid.327180 vuldb.com: https://vuldb.com/?submit.661303 github.com: https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formWanTcpipSetup.md github.com: https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formWanTcpipSetup.md#poc
Credits
๐ panda_0xf1 (VulDB User) VulDB