Cyber Posture

CVE-2025-11298

MediumPublic PoC

Published: 05 October 2025

Published
05 October 2025
Modified
29 April 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0024 46.8th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

Security Summary

CVE-2025-11298 is a command injection vulnerability affecting the Belkin F9K1015 router on firmware version 1.00.10. The flaw resides in an unknown function of the web interface file /goform/formSetWanStatic, where manipulation of the m_wan_ipaddr argument triggers command injection. Published on 2025-10-05, it carries a CVSS 3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and maps to CWE-74 and CWE-77.

Remote attackers with low privileges can exploit this vulnerability without user interaction. By crafting a malicious request to the affected endpoint, they can inject and execute arbitrary commands, potentially leading to limited impacts on confidentiality, integrity, and availability, such as unauthorized access to system resources or minor disruptions.

Advisories indicate the vendor was notified early but provided no response or patches. The exploit is publicly disclosed, with a proof-of-concept available at https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formSetWanStatic.md#poc; additional details appear on VulDB at https://vuldb.com/?ctiid.327179 and related entries. Practitioners should isolate affected devices and monitor for exploitation attempts until mitigations emerge.

Details

CWE(s)
CWE-74CWE-77

Affected Products

belkin
f9k1015 firmware
1.00.10

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1202 Indirect Command Execution Stealth
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
Why these techniques?

Remote command injection vulnerability in the Belkin F9K1015 router's web interface (/goform/formSetWanStatic) via m_wan_ipaddr enables exploitation of a public-facing application (T1190) and indirect command execution (T1202), as explicitly mapped in the VulDB advisory.

References