ID

VAR-202603-5111


CVE

CVE-2026-5042


TITLE

Belkin International of F9K1122  Multiple vulnerabilities in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-009438

DESCRIPTION

A security flaw has been discovered in Belkin F9K1122 1.00.33. The affected element is the function formCrossBandSwitch of the file /goform/formCrossBandSwitch of the component Parameter Handler. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. The affected elements are components. Attack code exploiting this vulnerability has been published and may be used to carry out attacks. The vendor was notified of this vulnerability early on, but received no response.All information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, the software may stop working completely

Trust: 1.62

sources: NVD: CVE-2026-5042 // JVNDB: JVNDB-2026-009438

AFFECTED PRODUCTS

vendor:belkinmodel:f9k1122scope:eqversion:1.00.33

Trust: 1.0

vendor:belkinmodel:f9k1122scope:eqversion: -

Trust: 0.8

vendor:belkinmodel:f9k1122scope:eqversion:f9k1122 firmware 1.00.33

Trust: 0.8

vendor:belkinmodel:f9k1122scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-009438 // NVD: CVE-2026-5042

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2026-5042
value: HIGH

Trust: 1.0

OTHER: JVNDB-2026-009438
value: HIGH

Trust: 0.8

cna@vuldb.com: CVE-2026-5042
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2026-009438
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

cna@vuldb.com: CVE-2026-5042
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2026-009438
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-009438 // NVD: CVE-2026-5042

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-787

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-009438 // NVD: CVE-2026-5042

PATCH

title://vuldb.com/vuln/353965url:https://github.com/Litengzheng/vul_db/blob/main/Belkin/vul_153/README.md

Trust: 0.8

sources: JVNDB: JVNDB-2026-009438

EXTERNAL IDS

db:NVDid:CVE-2026-5042

Trust: 2.6

db:JVNDBid:JVNDB-2026-009438

Trust: 0.8

sources: JVNDB: JVNDB-2026-009438 // NVD: CVE-2026-5042

REFERENCES

url:https://vuldb.com/submit/779123

Trust: 1.0

url:https://vuldb.com/vuln/353965/cti

Trust: 1.0

url:https://vuldb.com/vuln/353965

Trust: 1.0

url:https://github.com/litengzheng/vul_db/blob/main/belkin/vul_153/readme.md

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-5042

Trust: 0.8

sources: JVNDB: JVNDB-2026-009438 // NVD: CVE-2026-5042

SOURCES

db:JVNDBid:JVNDB-2026-009438
db:NVDid:CVE-2026-5042

LAST UPDATE DATE

2026-04-03T23:55:01.028000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-009438date:2026-04-01T02:29:00
db:NVDid:CVE-2026-5042date:2026-03-30T18:58:01.433

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-009438date:2026-04-01T00:00:00
db:NVDid:CVE-2026-5042date:2026-03-29T11:16:34.867