Soumettre #779124: Belkin F9K1122 1.00.33 Stack-based Buffer Overflowinformation

TitreBelkin F9K1122 1.00.33 Stack-based Buffer Overflow
DescriptionA vulnerability was found in Belkin F9K1122 1.00.33 . Affected by this vulnerability is the function formSetPassword of the file /goform/formSetPassword of the component webs. The manipulation of the argument webpage with an unknown input leads to a buffer overflow vulnerability.In formSetPassword function,it reads in a user-provided parameter webpage.And the variable p_reboot_msg is passed to the strcpy function without any length check, which may overflow the stack-based buffer reboot_msg.As a result, by requesting the page, an attacker can easily execute a denial of service attack or remote code execution.
La source⚠️ https://github.com/Litengzheng/vul_db/blob/main/Belkin/vul_154/README.md
Utilisateur LtzHuster2 (UID 96397)
Soumission13/03/2026 02:26 (il y a 20 jours)
Modérer27/03/2026 17:36 (15 days later)
StatutAccepté
Entrée VulDB353966 [Belkin F9K1122 1.00.33 Parameter /goform/formSetPassword webpage buffer overflow]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!