UNKNOWNCVE-2026-5613

CVE-2026-5613: Belkin Router Stack Overflow - HIGH

Platform

linux

Component

belkin-f9k1015

CVE-2026-5613 describes a stack-based buffer overflow vulnerability found in the Belkin F9K1015 router, specifically within the `/goform/formReboot` file's `formReboot` function. Successful exploitation allows a remote attacker to manipulate the `webpage` argument, potentially leading to a denial of service or even code execution. This vulnerability affects Belkin F9K1015 routers running version 1.00.10–1.00.10, and currently, no patch has been released by the vendor.

How to fix

Actualizar el firmware del dispositivo Belkin F9K1015 a una versión corregida por el fabricante.  Dado que el proveedor no ha respondido, se recomienda contactar al soporte técnico de Belkin o buscar actualizaciones en su sitio web oficial.  Hasta que se publique una actualización, se recomienda aislar el dispositivo de la red para mitigar el riesgo de explotación remota.

Frequently asked questions

What is CVE-2026-5613?

CVE-2026-5613 is a HIGH severity stack-based buffer overflow vulnerability in the Belkin F9K1015 router. It allows a remote attacker to potentially cause a denial of service or code execution by manipulating the `webpage` argument in the `/goform/formReboot` function.

Am I affected by CVE-2026-5613?

You are potentially affected if you are using a Belkin F9K1015 router running version 1.00.10–1.00.10. The vulnerability is remotely exploitable and a public exploit exists.

How can I fix or mitigate CVE-2026-5613?

Unfortunately, no official patch is currently available from Belkin. As a mitigation, consider isolating the affected router from the internet or implementing strict firewall rules to restrict access to the vulnerable function. Regularly monitor the router for suspicious activity.

Monitor your dependencies automatically

Get notified when new vulnerabilities affect your projects. Free forever.

Start free
CVE-2026-5613: Belkin Router Stack Overflow - HIGH | NextGuard