{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-11292","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-04T18:45:15.714Z","datePublished":"2025-10-05T14:02:05.574Z","dateUpdated":"2026-02-24T06:41:24.365Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:41:24.365Z"},"title":"Belkin F9K1015 formBSSetSitesurvey command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Belkin","product":"F9K1015","versions":[{"version":"1.00.10","status":"affected"}],"cpes":["cpe:2.3:o:belkin:f9k1015_firmware:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in Belkin F9K1015 1.00.10. Affected is an unknown function of the file /goform/formBSSetSitesurvey. Executing a manipulation of the argument wan_ipaddr can lead to command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-04T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-08T00:39:28.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"panda_0x1 (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/?id.327173","name":"VDB-327173 | Belkin F9K1015 formBSSetSitesurvey command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.327173","name":"VDB-327173 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.661295","name":"Submit #661295 | Belkin F9K1015 1.00.10 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formBSSetSitesurvey.md","tags":["related"]},{"url":"https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formBSSetSitesurvey.md#poc","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formBSSetSitesurvey.md#poc","tags":["exploit"]},{"url":"https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formBSSetSitesurvey.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-07T13:07:05.451439Z","id":"CVE-2025-11292","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-07T13:07:36.078Z"}}]}}