CVE-2025-7082

A vulnerability was found in Belkin F9K1122 1.00.33 and classified as critical. Affected by this issue is the function formBSSetSitesurvey of the file /goform/formBSSetSitesurvey of the component webs. The manipulation of the argument wan_ipaddr/wan_netmask/wan_gateway/wl_ssid is directly passed by the attacker/so we can control the wan_ipaddr/wan_netmask/wan_gateway/wl_ssid leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_2/2.md Exploit Third Party Advisory
https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_2/2.md#poc Exploit Third Party Advisory
https://vuldb.com/?ctiid.314996 Permissions Required
https://vuldb.com/?id.314996 Third Party Advisory VDB Entry
https://vuldb.com/?submit.603672 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:belkin:f9k1122_firmware:1.00.33:*:*:*:*:*:*:*
cpe:2.3:h:belkin:f9k1122:-:*:*:*:*:*:*:*

History

09 Jul 2025, 17:35

Type Values Removed Values Added
First Time Belkin f9k1122 Firmware
Belkin
Belkin f9k1122
CPE cpe:2.3:o:belkin:f9k1122_firmware:1.00.33:*:*:*:*:*:*:*
cpe:2.3:h:belkin:f9k1122:-:*:*:*:*:*:*:*
References () https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_2/2.md - () https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_2/2.md - Exploit, Third Party Advisory
References () https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_2/2.md#poc - () https://github.com/wudipjq/my_vuln/blob/main/Belkin/vuln_2/2.md#poc - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.314996 - () https://vuldb.com/?ctiid.314996 - Permissions Required
References () https://vuldb.com/?id.314996 - () https://vuldb.com/?id.314996 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.603672 - () https://vuldb.com/?submit.603672 - Third Party Advisory, VDB Entry

08 Jul 2025, 16:18

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en Belkin F9K1122 1.00.33, clasificada como crítica. Este problema afecta a la función formBSSetSitesurvey del archivo /goform/formBSSetSitesurvey del componente webs. La manipulación del argumento wan_ipaddr/wan_netmask/wan_gateway/wl_ssid, que el atacante pasa directamente, permite controlar wan_ipaddr/wan_netmask/wan_gateway/wl_ssid, lo que provoca la inyección de comandos en el sistema operativo. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación para informarle sobre esta divulgación, pero no respondió.

06 Jul 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-06 14:15

Updated : 2025-07-09 17:35


NVD link : CVE-2025-7082

Mitre link : CVE-2025-7082

CVE.ORG link : CVE-2025-7082


JSON object : View

Products Affected

belkin

  • f9k1122
  • f9k1122_firmware
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')