CVE-2026-5610: Belkin formWISP5G Buffer Overflow (HIGH)
Plattform
linux
Komponente
belkin-f9k1015
CVE-2026-5610 describes a stack-based buffer overflow vulnerability present in the Belkin F9K1015 formWISP5G device, specifically affecting version 1.00.10–1.00.10. Successful exploitation allows a remote attacker to potentially execute arbitrary code on the affected device, leading to a compromise of its functionality and data. The vulnerability resides within the formWISP5G function of the /goform/formWISP5G file, triggered by manipulation of the 'webpage' argument. The vulnerability is publicly disclosed and no response has been received from the vendor.
So beheben
Kein offizieller Patch verfügbar. Prüfe auf Workarounds oder überwache auf Updates.
Häufig gestellte Fragen
What is CVE-2026-5610?
CVE-2026-5610 is a publicly disclosed buffer overflow vulnerability affecting the Belkin F9K1015 formWISP5G device. It allows remote attackers to potentially execute code by manipulating the 'webpage' argument in the /goform/formWISP5G file.
Am I affected by CVE-2026-5610?
You are affected if you are using the Belkin F9K1015 device with firmware version 1.00.10–1.00.10. The vulnerability is remotely exploitable and the exploit is publicly available.
How can I fix or mitigate CVE-2026-5610?
No official patch is currently available from Belkin. Mitigation strategies may include isolating the device from external networks or implementing strict firewall rules to restrict access to the vulnerable endpoint. Contacting Belkin support is recommended.
Abhängigkeiten automatisch überwachen
Werde benachrichtigt, wenn neue Schwachstellen deine Projekte betreffen. Für immer kostenlos.
Kostenlos starten