TopVuln

High-risk vulnerability digests

CVE-2026-5044

  • CRITICAL

CVE-2026-5044 Belkin F9K1122 Setting formSetSystemSettings stack-based overflow

Details

CVSS v3
9.0
Affected versions
Belkin F9K1122 1.00.33
Summary
This is a remotely exploitable stack-based buffer overflow vulnerability in Belkin F9K1122 routers. It exists in the formSetSystemSettings function of the Setting Handler component, where malicious manipulation of the webpage argument triggers memory corruption. Public exploit code is available, and the vendor did not respond to vulnerability notification.
Remediation
Since the vendor did not release a patch for this vulnerability, organizations should replace the affected Belkin F9K1122 device with a supported alternative. If replacement is not immediate, restrict all external access to the router's management interface. Monitor network traffic for signs of unauthorized exploitation.
Exploit info
The exploit has been released to the public; public references are available at https://app.opencve.io/cve/CVE-2026-5044 or https://vulners.com/cve/CVE-2026-5044. | Potential exploit details can be searched in Exploit-DB or GitHub: https://www.exploit-db.com/search?cve=CVE-2026-5044 | https://github.com/search?q=CVE-2026-5044+exploit

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.