{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-11298","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-04T18:45:37.415Z","datePublished":"2025-10-05T18:02:05.803Z","dateUpdated":"2026-02-24T06:42:41.799Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:42:41.799Z"},"title":"Belkin F9K1015 formSetWanStatic command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Belkin","product":"F9K1015","versions":[{"version":"1.00.10","status":"affected"}],"cpes":["cpe:2.3:o:belkin:f9k1015_firmware:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in Belkin F9K1015 1.00.10. Impacted is an unknown function of the file /goform/formSetWanStatic. Executing a manipulation of the argument m_wan_ipaddr can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-04T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-08T00:39:28.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"panda_0xf1 (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/?id.327179","name":"VDB-327179 | Belkin F9K1015 formSetWanStatic command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.327179","name":"VDB-327179 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.661302","name":"Submit #661302 | Belkin F9K1015 1.00.10 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formSetWanStatic.md","tags":["related"]},{"url":"https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formSetWanStatic.md#poc","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formSetWanStatic.md","tags":["exploit"]},{"url":"https://github.com/panda666-888/vuls/blob/main/belkin/f9k1015/formSetWanStatic.md#poc","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-06T17:18:34.856788Z","id":"CVE-2025-11298","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-06T17:18:38.842Z"}}]}}