A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue is the function formWISP5G of the file /goform/formWISP5G. Such manipulation of the argument webpage leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/Litengzheng/vuldb_new/blob/main/Belkin%20F9K1015/vul_3/README.md | Exploit Third Party Advisory |
| https://vuldb.com/submit/785537 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/355401 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/355401/cti | Permissions Required VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
30 Apr 2026, 13:47
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Belkin
Belkin f9k1015 Belkin f9k1015 Firmware |
|
| CPE | cpe:2.3:o:belkin:f9k1015_firmware:1.00.10:*:*:*:*:*:*:* cpe:2.3:h:belkin:f9k1015:-:*:*:*:*:*:*:* |
|
| References | () https://github.com/Litengzheng/vuldb_new/blob/main/Belkin%20F9K1015/vul_3/README.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/submit/785537 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/355401 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/355401/cti - Permissions Required, VDB Entry |
06 Apr 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 02:16
Updated : 2026-04-30 13:47
NVD link : CVE-2026-5610
Mitre link : CVE-2026-5610
CVE.ORG link : CVE-2026-5610
JSON object : View
Products Affected
belkin
- f9k1015_firmware
- f9k1015
