Belkin F9K1122 Stack-Based Buffer Overflow Vulnerability
A stack-based buffer overflow vulnerability (CVE-2026-5044) in Belkin F9K1122 version 1.00.33 allows remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the formSetSystemSettings function, potentially leading to complete system compromise.
A critical security vulnerability, CVE-2026-5044, has been identified in Belkin F9K1122 router version 1.00.33. The vulnerability resides within the formSetSystemSettings function of the /goform/formSetSystemSettings file, which is part of the Setting Handler component. Successful exploitation allows a remote attacker to trigger a stack-based buffer overflow by manipulating the webpage argument. This could result in arbitrary code execution on the device. Publicly available exploit code…
Detection coverage 2
Detect Belkin F9K1122 Buffer Overflow Attempt
criticalDetects attempts to exploit CVE-2026-5044 by monitoring HTTP POST requests to the vulnerable endpoint with overly long webpage parameters.
Detect Belkin F9K1122 Buffer Overflow Traffic Volume
mediumDetects abnormally high network traffic to the vulnerable endpoint, indicating potential scanning or exploitation attempts.
Detection queries are kept inside the platform. Get full rules →