CVE-2026-5610: Belkin formWISP5G Buffer Overflow (HIGH)
Platform
linux
Component
belkin-f9k1015
CVE-2026-5610 describes a stack-based buffer overflow vulnerability found in the Belkin F9K1015 formWISP5G device, specifically affecting version 1.00.10–1.00.10. Successful exploitation allows a remote attacker to manipulate the 'webpage' argument within the /goform/formWISP5G function, potentially leading to a denial of service or, in a more severe scenario, arbitrary code execution. The vulnerability has been publicly disclosed, and the vendor has not responded to notifications.
How to fix
Actualizar el firmware del dispositivo Belkin F9K1015 a una versión corregida por el fabricante. Dado que el proveedor no ha respondido a las notificaciones, se recomienda contactar al soporte técnico de Belkin para obtener información sobre actualizaciones de seguridad. Como medida preventiva, deshabilitar o restringir el acceso a la función formWISP5G hasta que se publique una actualización oficial.
Frequently asked questions
What is CVE-2026-5610?
CVE-2026-5610 is a publicly disclosed buffer overflow vulnerability affecting the Belkin F9K1015 formWISP5G device. It allows remote attackers to potentially cause a denial of service or execute arbitrary code by manipulating the 'webpage' argument.
Am I affected by CVE-2026-5610?
You are affected if you are using a Belkin F9K1015 device running version 1.00.10–1.00.10. If you are using a different version, you are likely not affected, but it is always recommended to check for updates.
How can I fix or mitigate CVE-2026-5610?
Currently, no official patch is available from Belkin. Mitigation strategies may include isolating the affected device from external networks or implementing strict firewall rules to restrict access to the vulnerable endpoint.
Monitor your dependencies automatically
Get notified when new vulnerabilities affect your projects. Free forever.
Start free