| Titre | Belkin F9K1122 1.00.33 Stack-based Buffer Overflow |
|---|
| Description | A vulnerability was found in Belkin F9K1122 1.00.33 . Affected by this vulnerability is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component webs. The manipulation of the argument webpage with an unknown input leads to a buffer overflow vulnerability.In formSetSystemSettings function,it reads in a user-provided parameter webpage.And the variable p_reboot_msg is passed to the strcpy function without any length check, which may overflow the stack-based buffer reboot_msg.As a result, by requesting the page, an attacker can easily execute a denial of service attack or remote code execution. |
|---|
| La source | ⚠️ https://github.com/Litengzheng/vul_db/blob/main/Belkin/vul_155/README.md |
|---|
| Utilisateur | LtzHuster2 (UID 96397) |
|---|
| Soumission | 13/03/2026 02:27 (il y a 19 jours) |
|---|
| Modérer | 27/03/2026 17:37 (15 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 353967 [Belkin F9K1122 1.00.33 Setting formSetSystemSettings webpage buffer overflow] |
|---|
| Points | 20 |
|---|