ID

VAR-202603-5282


CVE

CVE-2026-5043


TITLE

Belkin International of F9K1122  Multiple vulnerabilities in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-009437

DESCRIPTION

A weakness has been identified in Belkin F9K1122 1.00.33. The impacted element is the function formSetPassword of the file /goform/formSetPassword of the component Parameter Handler. This manipulation of the argument webpage causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. Belkin F9K1122 1.00.33 A vulnerability exists in the component. We informed the vendor of this information early on, but received no response.All information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, the software may stop working completely

Trust: 1.62

sources: NVD: CVE-2026-5043 // JVNDB: JVNDB-2026-009437

AFFECTED PRODUCTS

vendor:belkinmodel:f9k1122scope:eqversion:1.00.33

Trust: 1.0

vendor:belkinmodel:f9k1122scope:eqversion: -

Trust: 0.8

vendor:belkinmodel:f9k1122scope:eqversion:f9k1122 firmware 1.00.33

Trust: 0.8

vendor:belkinmodel:f9k1122scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-009437 // NVD: CVE-2026-5043

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2026-5043
value: HIGH

Trust: 1.0

OTHER: JVNDB-2026-009437
value: HIGH

Trust: 0.8

cna@vuldb.com: CVE-2026-5043
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2026-009437
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

cna@vuldb.com: CVE-2026-5043
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2026-009437
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-009437 // NVD: CVE-2026-5043

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-787

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-009437 // NVD: CVE-2026-5043

PATCH

title://vuldb.com/vuln/353966url:https://github.com/Litengzheng/vul_db/blob/main/Belkin/vul_154/README.md

Trust: 0.8

sources: JVNDB: JVNDB-2026-009437

EXTERNAL IDS

db:NVDid:CVE-2026-5043

Trust: 2.6

db:JVNDBid:JVNDB-2026-009437

Trust: 0.8

sources: JVNDB: JVNDB-2026-009437 // NVD: CVE-2026-5043

REFERENCES

url:https://vuldb.com/vuln/353966

Trust: 1.0

url:https://vuldb.com/vuln/353966/cti

Trust: 1.0

url:https://vuldb.com/submit/779124

Trust: 1.0

url:https://github.com/litengzheng/vul_db/blob/main/belkin/vul_154/readme.md

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-5043

Trust: 0.8

sources: JVNDB: JVNDB-2026-009437 // NVD: CVE-2026-5043

SOURCES

db:JVNDBid:JVNDB-2026-009437
db:NVDid:CVE-2026-5043

LAST UPDATE DATE

2026-04-03T23:43:22.978000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-009437date:2026-04-01T02:29:00
db:NVDid:CVE-2026-5043date:2026-03-30T18:57:49.380

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-009437date:2026-04-01T00:00:00
db:NVDid:CVE-2026-5043date:2026-03-29T12:15:57.937