{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-5044/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["cve-2026-5044","buffer-overflow","belkin","router"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eA critical security vulnerability, CVE-2026-5044, has been identified in Belkin F9K1122 router version 1.00.33. The vulnerability resides within the \u003ccode\u003eformSetSystemSettings\u003c/code\u003e function of the \u003ccode\u003e/goform/formSetSystemSettings\u003c/code\u003e file, which is part of the Setting Handler component. Successful exploitation allows a remote attacker to trigger a stack-based buffer overflow by manipulating the \u003ccode\u003ewebpage\u003c/code\u003e argument. This could result in arbitrary code execution on the device. Publicly available exploit code…\u003c/p\u003e\n","date_modified":"2026-03-29T13:17:03Z","date_published":"2026-03-29T13:17:03Z","id":"/briefs/2026-03-belkin-overflow/","summary":"A stack-based buffer overflow vulnerability (CVE-2026-5044) in Belkin F9K1122 version 1.00.33 allows remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the formSetSystemSettings function, potentially leading to complete system compromise.","title":"Belkin F9K1122 Stack-Based Buffer Overflow Vulnerability","url":"https://feed.craftedsignal.io/briefs/2026-03-belkin-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-5044","version":"https://jsonfeed.org/version/1.1"}