{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-5042/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["cve-2026-5042","buffer-overflow","router"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eA critical stack-based buffer overflow vulnerability, identified as CVE-2026-5042, has been discovered in Belkin F9K1122 routers running firmware version 1.00.33. The vulnerability resides within the \u003ccode\u003eformCrossBandSwitch\u003c/code\u003e function of the \u003ccode\u003e/goform/formCrossBandSwitch\u003c/code\u003e file, a component of the Parameter Handler. Successful exploitation could allow a remote, unauthenticated attacker to execute arbitrary code on the device. Publicly available exploit code increases the risk of widespread…\u003c/p\u003e\n","date_modified":"2026-03-29T11:16:34Z","date_published":"2026-03-29T11:16:34Z","id":"/briefs/2026-03-belkin-buffer-overflow/","summary":"A stack-based buffer overflow vulnerability (CVE-2026-5042) exists in the Belkin F9K1122 router version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the webpage argument in the formCrossBandSwitch function.","title":"Belkin F9K1122 Router Stack-Based Buffer Overflow Vulnerability","url":"https://feed.craftedsignal.io/briefs/2026-03-belkin-buffer-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-5042","version":"https://jsonfeed.org/version/1.1"}