CVE-2025-7082
BaseFortify
Publication date: 2025-07-06
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| belkin | f9k1122_firmware | 1.00.33 |
| belkin | f9k1122 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-7082 is a critical OS command injection vulnerability in the Belkin F9K1122 router firmware version 1.00.33. It exists in the web interface function formBSSetSitesurvey, where parameters such as wan_ipaddr, wan_netmask, wan_gateway, and wl_ssid are taken directly from user input without proper sanitization. This allows a remote attacker to inject and execute arbitrary operating system commands on the device. [1, 2]
How can this vulnerability impact me? :
This vulnerability allows remote attackers to execute arbitrary OS commands on the affected router, which can compromise the device's confidentiality, integrity, and availability. An attacker could potentially take control of the device, disrupt network operations, or use the device as a pivot point for further attacks. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can be performed by monitoring for suspicious HTTP requests targeting the /goform/formBSSetSitesurvey endpoint with parameters wan_ipaddr, wan_netmask, wan_gateway, or wl_ssid containing unusual or command injection payloads. Network intrusion detection systems (NIDS) can be configured to alert on such patterns. Specific commands are not provided in the resources. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include replacing the affected Belkin F9K1122 device, as no known countermeasures or patches are available. Additionally, restricting remote access to the device's web interface and monitoring for exploit attempts can help reduce risk. [2]