CVE-2026-5043 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 29, 2026
Belkin F9K1122 - Buffer Overflow
Overview
Belkin F9K1122 1.00.33 contains a stack-based buffer overflow caused by manipulation of the "webpage" argument in /goform/formSetPassword Parameter Handler, letting remote attackers execute code, exploit requires crafted request.
Severity & Score
Impact
Remote attackers can execute arbitrary code, potentially leading to full system compromise.
Mitigation
Update to the latest version or apply vendor patches when available.
References
Social Media Activity(2 posts)
š CVE-2026-5043 - High (8.8) A weakness has been identified in Belkin F9K1122 1.00.33. The impacted element is the function formSetPassword of the file /goform/formSetPassword of the component Parameter Handler. This manipulation of the argument webpage causes stack-based buf... š https://www.thehackerwire.com/vulnerability/CVE-2026-5043/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-5043 - High (8.8) A weakness has been identified in Belkin F9K1122 1.00.33. The impacted element is the function formSetPassword of the file /goform/formSetPassword of the component Parameter Handler. This manipulation of the argument webpage causes stack-based buf... š https://www.thehackerwire.com/vulnerability/CVE-2026-5043/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-5043
- Severity
- High
- CVSS Score
- 8.8
- Type
- buffer_overflow
- Status
- new
- EPSS
- 0.0%
- Social Posts
- 2
CWE
- CWE-119
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H