TopVuln

High-risk vulnerability digests

CVE-2026-5608

  • HIGH

Details

CVSS v3
8.8
CVSS v4
7.4
CVSS v2
9.0
NVD published
2026-04-06 01:16:40
EPSS
0.1% probability · 28.5th percentile — 2026-05-12
Affected versions
Belkin F9K1122 1.00.33
Summary
This is a remotely exploitable stack-based buffer overflow vulnerability in Belkin F9K1122 wireless routers. The flaw occurs in the formWlanSetup function when processing user input to the webpage argument. An unauthenticated remote attacker can exploit this issue to execute arbitrary code on the affected device. The vendor did not respond to the vulnerability disclosure, so no official patch is available.
Remediation
Since no official security patch is available, organizations should isolate affected devices from public and untrusted networks. Replace the end-of-life Belkin F9K1122 device with a currently supported router from a vendor that provides regular security updates. Restrict access to the device's management interface to only trusted internal IP addresses.
Exploit info
The exploit has been released to the public; public references are available at https://app.opencve.io/cve/CVE-2026-5608 or https://vulners.com/cve/CVE-2026-5608. | Potential exploit details can be searched in Exploit-DB or GitHub: https://www.exploit-db.com/search?cve=CVE-2026-5608 | https://github.com/search?q=CVE-2026-5608+exploit

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.