A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/Litengzheng/vuldb_new/blob/main/Belkin%20F9K1015/vul_12/README.md | Exploit Third Party Advisory |
| https://vuldb.com/submit/785555 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/355416 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/355416/cti | Permissions Required VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
30 Apr 2026, 13:47
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:belkin:f9k1015_firmware:1.00.10:*:*:*:*:*:*:* cpe:2.3:h:belkin:f9k1015:-:*:*:*:*:*:*:* |
|
| First Time |
Belkin
Belkin f9k1015 Belkin f9k1015 Firmware |
|
| References | () https://github.com/Litengzheng/vuldb_new/blob/main/Belkin%20F9K1015/vul_12/README.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/submit/785555 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/355416 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/355416/cti - Permissions Required, VDB Entry |
06 Apr 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 06:16
Updated : 2026-04-30 13:47
NVD link : CVE-2026-5628
Mitre link : CVE-2026-5628
CVE.ORG link : CVE-2026-5628
JSON object : View
Products Affected
belkin
- f9k1015_firmware
- f9k1015
