UNKNOWNCVE-2026-5610

CVE-2026-5610: Belkin formWISP5G Buffer Overflow (HIGH)

Plattform

linux

Komponente

belkin-f9k1015

CVE-2026-5610 describes a stack-based buffer overflow vulnerability present in the Belkin F9K1015 formWISP5G device, specifically affecting version 1.00.10–1.00.10. Successful exploitation allows a remote attacker to potentially execute arbitrary code on the affected device, leading to a compromise of its functionality and data. The vulnerability resides within the formWISP5G function of the /goform/formWISP5G file, triggered by manipulation of the 'webpage' argument. The vulnerability is publicly disclosed and no response has been received from the vendor.

So beheben

Kein offizieller Patch verfügbar. Prüfe auf Workarounds oder überwache auf Updates.

Häufig gestellte Fragen

What is CVE-2026-5610?

CVE-2026-5610 is a publicly disclosed buffer overflow vulnerability affecting the Belkin F9K1015 formWISP5G device. It allows remote attackers to potentially execute code by manipulating the 'webpage' argument in the /goform/formWISP5G file.

Am I affected by CVE-2026-5610?

You are affected if you are using the Belkin F9K1015 device with firmware version 1.00.10–1.00.10. The vulnerability is remotely exploitable and the exploit is publicly available.

How can I fix or mitigate CVE-2026-5610?

No official patch is currently available from Belkin. Mitigation strategies may include isolating the device from external networks or implementing strict firewall rules to restrict access to the vulnerable endpoint. Contacting Belkin support is recommended.

Abhängigkeiten automatisch überwachen

Werde benachrichtigt, wenn neue Schwachstellen deine Projekte betreffen. Für immer kostenlos.

Kostenlos starten
CVE-2026-5610: Belkin formWISP5G Buffer Overflow (HIGH) | NextGuard