A vulnerability was found in Linksys E1700 1
Description
A vulnerability was found in Linksys E1700 1
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
44 vulnerabilities from Linksys
← Back to all CVEsA vulnerability was found in Linksys E1700 1
A vulnerability was found in Linksys E1700 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in Linksys E1700 1
A vulnerability has been found in Linksys E1700 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A flaw has been found in Linksys E1700 1
A flaw has been found in Linksys E1700 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Executive Summary:
A high-severity vulnerability has been discovered in multiple Linksys network extender products, identified as CVE-2025-9392. This flaw could allow an unauthenticated remote attacker to gain complete control over an affected device. Successful exploitation could lead to network traffic interception, unauthorized access to the internal network, and significant operational disruption.
Vulnerability Details
CVE-ID: CVE-2025-9392
Affected Software: Linksys RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000
Affected Versions: See vendor advisory for specific affected firmware versions.
Vulnerability: This vulnerability is an unauthenticated command injection flaw in the web-based management interface of the affected devices. An attacker can exploit this by sending a specially crafted HTTP request to the device's web server. The input is not properly sanitized, allowing the attacker to inject and execute arbitrary operating system commands with root-level privileges, resulting in a complete compromise of the device.
Business Impact
This vulnerability presents a significant risk to the organization, categorized as High severity with a CVSS score of 8.8. An attacker who successfully exploits this flaw can gain a foothold within the network perimeter. Potential consequences include eavesdropping on network traffic, performing man-in-the-middle attacks to steal sensitive data, using the compromised device to launch attacks against other internal systems, or causing a denial-of-service condition by disrupting network connectivity. This could lead to data breaches, operational downtime, and reputational damage.
Remediation Plan
Immediate Action:
Proactive Monitoring:
Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes:
As of August 24, 2025, there is no known public proof-of-concept exploit code, and no active exploitation has been observed in the wild. However, given the high severity and the straightforward nature of command injection vulnerabilities, it is highly probable that a functional exploit will be developed and published by security researchers or threat actors in the near future.
Analyst Recommendation
Given the high CVSS score of 8.8 and the risk of complete network compromise, this vulnerability should be treated as a critical priority. We strongly recommend that organizations apply the vendor-supplied patches to all affected Linksys devices immediately, in accordance with emergency patching timelines. Although this CVE is not currently listed on the CISA KEV catalog, its severity makes it a likely candidate for future inclusion. Proactive patching is the most effective defense against potential future exploitation.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Executive Summary:
A high-severity vulnerability has been discovered in multiple Linksys Wi-Fi extender models. This flaw allows an unauthenticated attacker on the local network to gain complete control over affected devices. Successful exploitation could lead to network traffic interception, unauthorized access to the internal network, and further system compromise.
Vulnerability Details
CVE-ID: CVE-2025-9363
Affected Software: Linksys Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is an unauthenticated command injection flaw within the web-based management interface of the affected Linksys devices. An attacker on the same local network can send a specially crafted HTTP request to a specific API endpoint on the device. Due to insufficient input sanitization, this allows the attacker to execute arbitrary commands on the device's underlying operating system with root-level privileges, requiring no prior authentication.
Business Impact
This vulnerability presents a high-severity risk to the organization, reflected by its CVSS score of 8.8. An attacker successfully exploiting this flaw could gain complete administrative control over the network extenders. This could lead to significant business disruption, including the interception of sensitive internal network traffic, unauthorized access to other critical systems, and the ability to launch further attacks from a trusted internal position. A compromised device could also be incorporated into a botnet, potentially causing reputational damage.
Remediation Plan
Immediate Action: Immediately apply the security updates released by Linksys to all affected Wi-Fi extender models. Prioritize patching for devices that are accessible from less trusted network segments. After patching, verify that the update was successful and the device is operating normally.
Proactive Monitoring: Monitor web server access logs on the Linksys devices for unusual or malformed HTTP requests, particularly those targeting administrative functions from unexpected internal IP addresses. Network Intrusion Detection Systems (NIDS) should be configured with signatures to detect command injection attempts. Monitor for anomalous outbound traffic from the extenders, which could indicate a successful compromise and communication with a command-and-control server.
Compensating Controls: If immediate patching is not feasible, restrict access to the device's web management interface to a limited set of trusted administrative IP addresses using network access control lists (ACLs). If the functionality is not required, consider disabling the web interface on untrusted network segments.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 24, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the high severity (CVSS 8.8) and the nature of the flaw (unauthenticated command injection), it is highly likely that proof-of-concept (PoC) exploit code will be developed and released by security researchers or threat actors in the near future.
Analyst Recommendation
Due to the high severity of this vulnerability, immediate action is required. We recommend that all affected Linksys Wi-Fi extenders identified within the organization be patched immediately following the vendor's advisory. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high impact and the potential for a simple exploit mean it is a prime target for future exploitation. Organizations should treat this as a critical priority for their patch management cycle to prevent potential network compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Executive Summary:
A high-severity vulnerability has been identified in multiple Linksys Wi-Fi extender models, carrying a CVSS score of 8.8. This flaw could allow a remote, unauthenticated attacker to gain complete control over an affected device. Successful exploitation could lead to network traffic interception, unauthorized access to the internal network, and disruption of services.
Vulnerability Details
CVE-ID: CVE-2025-9361
Affected Software: Linksys Multiple Products
Affected Versions: See vendor advisory for specific affected versions. The affected models include RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000.
Vulnerability: The provided description is general, but a CVSS score of 8.8 typically indicates a critical vulnerability, such as unauthenticated remote code execution (RCE). An attacker on the same network segment could likely send a specially crafted request to the device's web management interface to execute arbitrary commands with root-level privileges. This type of exploit generally requires no user interaction or prior authentication, making it highly dangerous and easily weaponized.
Business Impact
This is a High severity vulnerability with a CVSS score of 8.8, posing a significant risk to the organization. Successful exploitation would grant an attacker full control over the compromised Wi-Fi extender. This could lead to severe consequences, including an attacker establishing a persistent foothold on the network, intercepting sensitive data passing through the device (Man-in-the-Middle attack), pivoting to attack other internal systems, or using the device in a botnet for DDoS attacks. The compromise of a network infrastructure device can undermine network segmentation and security controls, potentially leading to a full network breach.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor to all affected Linksys devices immediately. After patching, review device access logs and network monitoring data for any signs of compromise that may have occurred prior to the update.
Proactive Monitoring: Implement enhanced monitoring for affected devices. Look for unusual inbound traffic to the device's management interface, unexpected outbound connections from the device to the internet, and any unauthorized configuration changes or device reboots. Network Intrusion Detection Systems (IDS) should be configured with rules to detect common web-based exploitation attempts.
Compensating Controls: If patching cannot be performed immediately, implement compensating controls to reduce the attack surface. Restrict access to the device's web management interface to a dedicated management VLAN or a list of trusted IP addresses. Ensure that remote (WAN) management is disabled, limiting exposure to the local network only.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of its publication date, August 24, 2025, there are no known public exploits or indications of active exploitation in the wild. However, given the high severity score and the prevalence of these consumer and small business devices, security researchers and threat actors are likely to develop proof-of-concept exploits quickly. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Due to the High severity (CVSS 8.8) of this vulnerability, immediate patching is the highest priority. Network infrastructure devices like these are prime targets for attackers seeking to gain initial access to a network. Organizations must identify all affected Linksys models on their networks and deploy the vendor-supplied security patches without delay to prevent potential network compromise. If patching is not feasible, the compensating controls listed above should be implemented as an urgent temporary measure.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Executive Summary:
A high-severity vulnerability, identified as CVE-2025-9360, has been discovered in multiple Linksys Wi-Fi range extenders. This flaw could allow a remote attacker to gain complete control over an affected device, potentially leading to network traffic interception, unauthorized access to the internal network, and service disruption. Immediate application of vendor-provided security updates is required to mitigate this significant risk.
Vulnerability Details
CVE-ID: CVE-2025-9360
Affected Software: Linksys Multiple Products
Affected Versions: The vulnerability impacts Linksys RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 models. See vendor advisory for specific affected firmware versions.
Vulnerability: The vulnerability is an unauthenticated command injection flaw within the web-based management interface of the affected devices. An unauthenticated attacker on the same network segment can send a specially crafted HTTP request to a specific API endpoint on the device. Due to insufficient input validation, the attacker's payload is executed directly by the underlying operating system with root-level privileges, granting them complete control over the device.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation could have a significant negative impact on business operations. A successful attacker could gain full administrative control of the network device, leading to severe consequences such as eavesdropping on sensitive network traffic, modifying network configurations to redirect users to malicious sites, or using the compromised device as a pivot point to launch further attacks against other critical assets on the internal network. The potential for network disruption and data breaches poses a direct risk to business continuity and data confidentiality.
Remediation Plan
Immediate Action:
Proactive Monitoring:
Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes:
As of August 24, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the high severity and relative simplicity of command injection flaws, proof-of-concept (PoC) exploits are likely to be developed and published by security researchers, which could quickly be weaponized by threat actors.
Analyst Recommendation
Given the High severity (CVSS 8.8) of this vulnerability and the potential for complete device compromise, it is strongly recommended that the organization prioritizes the immediate patching of all affected Linksys devices. While this CVE is not currently on the CISA KEV catalog, its high impact makes it a prime candidate for future inclusion if widespread exploitation occurs. If patching cannot be performed immediately, implement the recommended compensating controls, particularly restricting access to the management interface, to reduce the attack surface and mitigate risk.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Executive Summary:
A high-severity vulnerability has been identified in multiple Linksys Wi-Fi extender products, earning a CVSS score of 8.8. This flaw could allow an unauthenticated remote attacker to take complete control of an affected device. Successful exploitation could lead to network traffic interception, unauthorized access to the internal network, and disruption of service.
Vulnerability Details
CVE-ID: CVE-2025-9359
Affected Software: Linksys Multiple Products
Affected Versions: See vendor advisory for specific affected versions. The following models are impacted: RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000.
Vulnerability: The vulnerability is a critical weakness in the web-based management interface of the affected Linksys devices. An unauthenticated attacker on the same network segment can send a specially crafted HTTP request to the device, triggering a remote code execution condition. This would allow the attacker to execute arbitrary commands on the underlying operating system with the highest level of privileges, leading to a full compromise of the device.
Business Impact
This vulnerability presents a High severity with a CVSS score of 8.8. Exploitation could have significant consequences for the organization, as the affected Wi-Fi extenders are trusted devices within the network perimeter. A successful attack could lead to a complete loss of confidentiality, integrity, and availability of the device and the network traffic it handles. Specific risks include interception of sensitive data (e.g., credentials, financial information), using the compromised device as a pivot point to attack other internal systems, disrupting network connectivity, and enrolling the device into a botnet for use in larger attacks.
Remediation Plan
Immediate Action: Apply the security updates released by Linksys to all affected devices immediately. Prioritize patching for devices that are accessible from less trusted network segments. After patching, monitor for any signs of exploitation attempts that may have occurred prior to the update and review system and access logs for any unauthorized activity.
Proactive Monitoring: Implement enhanced monitoring of network traffic to and from affected devices. Specifically, look for unusual inbound connection attempts to the device's management interface, unexpected outbound connections initiated from the device, and anomalies in DNS requests. System logs should be monitored for unexpected reboots, configuration changes, or error messages.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 24, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the high severity score and the widespread deployment of these devices, it is highly probable that proof-of-concept exploit code will be developed and released by security researchers or threat actors in the near future.
Analyst Recommendation
Due to the high severity score of 8.8, which indicates a critical risk of unauthenticated remote code execution, immediate patching is the highest priority. This vulnerability allows an attacker to gain a significant foothold within the network perimeter. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high impact and low attack complexity make it a prime candidate for future inclusion. Organizations must act proactively to apply the vendor-provided patches across all affected Linksys devices to prevent potential compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A security flaw has been discovered in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A security flaw has been discovered in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Executive Summary:
A high-severity vulnerability has been identified in multiple Linksys Wi-Fi extender products, allowing an unauthenticated attacker on the local network to take complete control of affected devices. Successful exploitation could lead to network traffic interception, unauthorized access to the internal network, and deployment of malware, posing a significant risk to network integrity and data confidentiality.
Vulnerability Details
CVE-ID: CVE-2025-9358
Affected Software: Linksys Multiple Products
Affected Versions: See vendor advisory for specific affected versions of firmware for the RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 models.
Vulnerability: This vulnerability is an unauthenticated remote command injection flaw in the web-based management interface of the affected devices. An attacker on the same network segment can send a specially crafted HTTP request to a specific endpoint on the device's web server. Due to insufficient input sanitization, this request can inject and execute arbitrary operating system commands with root-level privileges, granting the attacker full administrative control over the device.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation of this flaw could have a severe impact on business operations. An attacker could compromise the Wi-Fi extender to eavesdrop on network traffic, redirect users to malicious websites, or use the device as a pivot point to launch further attacks against other systems on the internal corporate network. The complete compromise of these network devices could lead to significant data breaches, network outages, and reputational damage.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by Linksys to all affected devices immediately. Prioritize patching devices in sensitive network locations. After patching, review device access logs and system logs for any signs of compromise or unauthorized activity that may have occurred before the patch was applied.
Proactive Monitoring: Monitor network traffic for unusual outbound connections originating from the Linksys devices. Review web server logs on the devices for suspicious HTTP requests containing shell metacharacters (e.g., ;, |, &&, $()). Implement alerts for unexpected reboots or high CPU usage on these devices, which could indicate malicious activity.
Compensating Controls: If immediate patching is not feasible, restrict access to the device's web management interface to a dedicated and trusted administrative VLAN or specific IP addresses. If the management interface must be accessible, consider placing a Web Application Firewall (WAF) in front of it with rules designed to block command injection attempts. Ensure these devices are not directly exposed to the internet.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 24, 2025, there are no known public exploits or reports of this vulnerability being actively exploited in the wild. However, given the high severity and relative simplicity of command injection flaws, it is highly probable that proof-of-concept exploit code will be developed and published by security researchers in the near future.
Analyst Recommendation
Given the high CVSS score of 8.8, this vulnerability represents a critical risk to the network infrastructure. We strongly recommend that organizations identify all affected Linksys devices and apply the vendor-supplied patches on an emergency basis. Although this CVE is not currently on the CISA KEV list, its severity makes it a prime candidate for future inclusion, and proactive remediation is essential to prevent potential compromise of the network.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Executive Summary:
A high-severity vulnerability has been discovered in multiple Linksys Wi-Fi range extenders, allowing an unauthenticated attacker on the local network to take complete control of affected devices. Successful exploitation could lead to network traffic interception, unauthorized access to the internal network, and service disruption. Organizations are urged to apply the vendor-supplied security updates immediately to mitigate this critical risk.
Vulnerability Details
CVE-ID: CVE-2025-9357
Affected Software: Linksys Multiple Products
Affected Versions: See vendor advisory for specific affected versions. The following models are impacted: RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000.
Vulnerability: The vulnerability is an unauthenticated command injection flaw in the web management interface of the affected devices. An attacker with access to the same local area network (LAN) can send a specially crafted HTTP request to a specific API endpoint. Due to insufficient input validation, the attacker's malicious commands are executed on the underlying operating system with the highest privileges (root), leading to a full compromise of the device.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would grant an attacker complete administrative control over the affected Linksys device. This could have severe business consequences, including the interception of sensitive corporate and personal data, disruption of network connectivity, and the use of the compromised device as a pivot point to launch further attacks against other critical assets on the internal network. The risk includes data breaches, operational downtime, and reputational damage.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately. Administrators should navigate to the Linksys support website, locate the firmware downloads for their specific model, and follow the instructions to update the device. After patching, monitor device logs and network traffic for any signs of compromise that may have occurred prior to the update.
Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes reviewing web access logs on the devices for unusual or malformed requests, monitoring for unexpected outbound connections from the Linksys extenders, and looking for anomalous network traffic patterns. Set up alerts for any unauthorized configuration changes or device reboots.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 24, 2025, there are no known public proof-of-concept exploits or reports of this vulnerability being actively exploited in the wild. However, due to the high severity and relative simplicity of command injection vulnerabilities, it is highly probable that threat actors will develop and deploy exploits in the near future.
Analyst Recommendation
Given the high CVSS score of 8.8, this vulnerability poses a significant and immediate threat to the network. We strongly recommend that organizations identify all affected Linksys devices within their environment and prioritize applying the vendor-provided firmware updates without delay. Although this CVE is not currently on the CISA KEV list, its critical nature makes it a prime candidate for future inclusion and a high-value target for attackers. Proactive patching is the most effective defense against potential compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A security flaw has been discovered in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A security flaw has been discovered in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
Executive Summary:
A high-severity vulnerability has been identified in multiple Linksys Wi-Fi extender models, allowing a remote, unauthenticated attacker to potentially take full control of an affected device. Successful exploitation could enable an adversary to intercept network traffic, pivot to other internal network resources, or disrupt network availability. Due to the severity and the widespread use of these devices in both home and business environments, immediate patching is critical.
Vulnerability Details
CVE-ID: CVE-2025-8820
Affected Software: Linksys Multiple Products
Affected Versions: All firmware versions up to and including 20250801 on the following models are affected: RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000.
Vulnerability: The vulnerability is an unauthenticated command injection flaw within the web-based administration interface of the affected devices. An attacker on the same network can send a specially crafted HTTP request to a specific, exposed API endpoint. The device fails to properly sanitize user-supplied input within this request, allowing the attacker to inject and execute arbitrary operating system commands with root-level privileges, leading to a complete compromise of the device.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit grants an attacker complete administrative control over the network extender. This could lead to severe business consequences, including eavesdropping on sensitive network traffic, redirecting users to phishing websites via DNS hijacking, and using the compromised device as a launchpad for further attacks against the internal corporate network. Additionally, compromised devices could be conscripted into a botnet for use in Distributed Denial-of-Service (DDoS) attacks, potentially causing reputational damage and service disruption.
Remediation Plan
Immediate Action: Organizations must apply the security updates provided by Linksys to all affected devices immediately. After patching, system administrators should review device access and system logs for any signs of unauthorized access or anomalous activity that may have occurred prior to the update.
Proactive Monitoring: Monitor network traffic for unusual outbound connections originating from the Linksys extenders. System administrators should review web administration logs for suspicious GET or POST requests containing shell metacharacters (e.g., ;, |, &&, $()). Monitor for unexpected configuration changes or unscheduled device reboots.
Compensating Controls: If patching cannot be performed immediately, implement the following controls to reduce the risk of exploitation:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 11, 2025, there is no known public proof-of-concept exploit code, and the vulnerability is not reported as being actively exploited in the wild. However, given the high severity and the simplicity of command injection vulnerabilities, it is highly probable that a functional exploit will be developed and released by security researchers or malicious actors in the near future.
Analyst Recommendation
Given the High severity (CVSS 8.8) of this vulnerability, we recommend that organizations treat this as a critical priority. All affected Linksys devices must be identified and patched immediately to prevent potential device compromise and subsequent network intrusion. Although this CVE is not currently listed on the CISA KEV list, its high impact warrants immediate action. If patching is delayed, the compensating controls listed above should be implemented without delay to mitigate risk.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
Executive Summary:
A high-severity vulnerability has been identified in multiple Linksys WiFi range extender models, carrying a CVSS score of 8.8. Successful exploitation could allow a remote attacker to gain complete control over an affected device, potentially leading to network traffic interception, unauthorized access to the internal network, and service disruption. Organizations using these devices are urged to apply vendor-supplied patches immediately to mitigate the significant risk to network security.
Vulnerability Details
CVE-ID: CVE-2025-8819
Affected Software: Linksys Multiple Products
Affected Versions: The vulnerability impacts the following products with firmware versions up to 20250801:
Vulnerability: The vulnerability is likely an unauthenticated command injection flaw within the web-based management interface of the affected devices. An unauthenticated attacker on the same local network could send a specially crafted HTTP request to the device's administrative portal. This request would exploit improper input validation, allowing the attacker to inject and execute arbitrary operating system commands with the highest level of privileges (root), leading to a complete compromise of the device.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation would have a significant business impact by allowing an attacker to take full control of the network extender. This could lead to severe consequences, including the interception and theft of sensitive data passing through the network, redirection of users to malicious websites, and using the compromised device as a beachhead to launch further attacks against other systems on the corporate or home network. The risk includes loss of data confidentiality and integrity, network service disruption, and the potential for a wider network breach originating from a seemingly low-impact peripheral device.
Remediation Plan
Immediate Action:
Administrators must apply the vendor-provided security updates immediately. Visit the official Linksys support website, locate the specific product model, and download and install the latest firmware version that addresses this vulnerability. After patching, monitor for any signs of exploitation and review device access logs for any unauthorized or suspicious activity that may have occurred prior to remediation.
Proactive Monitoring:
Security teams should monitor for indicators of compromise, including:
Compensating Controls:
If immediate patching is not feasible, implement the following compensating controls:
Exploitation Status
Public Exploit Available: False (as of August 11, 2025)
Analyst Notes:
As of the publication date, August 11, 2025, there is no known public proof-of-concept exploit or evidence of this vulnerability being actively exploited in the wild. However, given the high CVSS score and the widespread deployment of these consumer and small business devices, security researchers and threat actors are likely to develop exploit code rapidly. The vulnerability is currently not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Given the high severity (CVSS 8.8) of this vulnerability and the risk of complete system compromise, we strongly recommend that organizations treat this as a critical priority. The potential for an attacker to gain a foothold on the internal network through these devices presents a substantial risk. All affected Linksys range extenders must be identified and patched with the latest firmware from the vendor without delay. Due to the high likelihood of future exploitation, immediate remediation is the most effective course of action to protect network integrity and security.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
Executive Summary:
A high-severity vulnerability has been discovered in multiple Linksys Wi-Fi range extender models, carrying a CVSS score of 8.8. An attacker could exploit this flaw to gain complete control over an affected device, potentially allowing them to intercept network traffic, disrupt service, or use the device as a launching point for further attacks against the internal network. Organizations using these products should take immediate action to mitigate this significant risk.
Vulnerability Details
CVE-ID: CVE-2025-8817
Affected Software: Linksys Multiple Products
Affected Versions: Firmware versions up to 20250801 for Linksys RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000.
Vulnerability: The vulnerability is an unauthenticated command injection flaw in the web management interface of the affected devices. An attacker on the same local network as the device can send a specially crafted HTTP request to a specific API endpoint. Due to insufficient input validation, the attacker can inject and execute arbitrary operating system commands with root-level privileges on the device, leading to a full system compromise.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would grant an attacker complete control over the compromised network device. This could lead to severe business consequences, including the interception of sensitive data traversing the network, denial-of-service (DoS) attacks causing network outages, and the ability for an attacker to pivot from the compromised extender to other critical systems on the corporate network. The compromised device could also be co-opted into a botnet for use in larger-scale attacks, posing a reputational risk to the organization.
Remediation Plan
Immediate Action:
Administrators must apply the security updates provided by the vendor to all affected devices immediately. Following the update, it is critical to monitor for any signs of exploitation attempts that may have occurred prior to patching. This includes a thorough review of system and access logs for any unauthorized or suspicious activity.
Proactive Monitoring:
Implement monitoring to detect potential exploitation attempts. Security teams should look for unusual patterns in web access logs for the devices, such as malformed requests or requests containing shell commands (e.g., wget, curl, nc). Monitor network traffic for unexpected outbound connections from the Linksys devices to unknown IP addresses, which could indicate a command-and-control (C2) channel.
Compensating Controls:
If immediate patching is not feasible, implement the following compensating controls to reduce risk:
Exploitation Status
Public Exploit Available: False
Analyst Notes:
As of August 10, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, due to the high severity score and the relative ease of exploiting command injection flaws, it is highly likely that a functional exploit will be developed and published by security researchers or threat actors in the near future.
Analyst Recommendation
This vulnerability presents a high risk to the organization and requires immediate attention. Although CVE-2025-8817 is not currently on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high-impact nature warrants urgent action. We strongly recommend that all system owners identify and patch affected Linksys devices immediately. If patching is delayed, the compensating controls outlined above, especially restricting access to the management interface, must be implemented as a top priority to mitigate the risk of a network breach.
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801
Executive Summary:
A high-severity vulnerability has been identified in multiple Linksys WiFi range extender models. Successful exploitation could allow a remote, unauthenticated attacker to take full control of an affected device, potentially leading to network disruption, data theft, and unauthorized access to the internal network. Organizations are strongly advised to apply the vendor-provided security updates immediately to mitigate this significant risk.
Vulnerability Details
CVE-ID: CVE-2025-8816
Affected Software: Linksys Multiple Products
Affected Versions: All firmware versions up to and including 20250801 for the following models: RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000.
Vulnerability: The vulnerability is a critical flaw, likely an unauthenticated remote code execution (RCE) vulnerability within the device's web management interface. An attacker on the same local network (or remotely, if the management interface is exposed to the internet) can send a specially crafted HTTP request to an affected extender. This request can exploit a flaw in how the device processes input, allowing the attacker to execute arbitrary commands on the underlying operating system with the highest level of privileges (root).
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation could have severe consequences for the organization's security and operations. A successful attack could lead to a complete compromise of the network extender, enabling an adversary to intercept, view, or modify all network traffic passing through it, including sensitive credentials and confidential data. The compromised device could also serve as a persistent foothold for an attacker to pivot and launch further attacks against other critical systems on the internal network, or be used to launch a denial-of-service attack, disrupting wireless connectivity for dependent users.
Remediation Plan
Immediate Action:
Proactive Monitoring:
Compensating Controls:
If patching cannot be performed immediately, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of August 10, 2025, there are no known public proof-of-concept exploits or observed in-the-wild attacks targeting this vulnerability. However, given the high CVSS score and the widespread deployment of these devices in home and small business environments, it is highly probable that threat actors will reverse-engineer the patch and develop exploit code in the near future.
Analyst Recommendation
Due to the high severity (CVSS 8.8) of this vulnerability and the potential for complete device compromise, it is imperative that organizations take immediate action. The primary recommendation is to apply the vendor-supplied security updates to all affected Linksys extenders without delay. Although this CVE is not currently listed on the CISA KEV catalog, its critical nature makes it a prime candidate for future inclusion should widespread exploitation occur. Prioritize the remediation of these devices to prevent a significant breach of network security.
A stack-based buffer overflow exists in the validate_static_route function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2
A stack-based buffer overflow exists in the validate_static_route function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A stack-based buffer overflow exists in the httpd binary of Linksys E1200 v2 routers (Firmware E1200_v2
A stack-based buffer overflow exists in the httpd binary of Linksys E1200 v2 routers (Firmware E1200_v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2
A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2
Executive Summary:
A high-severity vulnerability has been identified in multiple Linksys router products, which could allow an unauthenticated attacker to remotely take full control of an affected device. This stack-based buffer overflow flaw (CVE-2025-60690) can be exploited by sending a malicious request to the router's web interface, potentially leading to network traffic interception, data theft, or the compromise of the internal network.
Vulnerability Details
CVE-ID: CVE-2025-60690
Affected Software: Linksys Multiple Products
Affected Versions: The vulnerability is confirmed in Linksys E1200 v2 routers (Firmware E1200_v2). See the vendor advisory for a complete list of all affected products and versions.
Vulnerability: This vulnerability is a stack-based buffer overflow within the get_merge_ipaddr function of the router's web server (httpd) binary. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted HTTP request containing an overly long string to a parameter processed by the vulnerable function. This action overwrites the program's execution stack, allowing the attacker to redirect the flow of execution and run arbitrary code on the device with root-level privileges, resulting in a complete system compromise.
Business Impact
This is a high-severity vulnerability with a CVSS score of 8.8. Successful exploitation would grant an attacker complete administrative control over the affected network device. This could lead to significant business disruption, including the ability to intercept, monitor, or redirect all network traffic (Man-in-the-Middle attacks), gain unauthorized access to the internal corporate network, launch further attacks from the compromised device, or cause a complete denial of service. The compromise of a network perimeter device poses a critical risk to data confidentiality, integrity, and availability.
Remediation Plan
Immediate Action: Apply vendor-supplied security updates to all affected Linksys devices immediately. Before and after patching, monitor for any signs of exploitation attempts by reviewing device and network access logs for anomalous activity targeting the web management interface.
Proactive Monitoring: Security teams should monitor web server access logs on affected devices for unusually long or malformed HTTP requests. Network monitoring should be configured to alert on unexpected inbound connections to the router's management interface or any unusual outbound traffic originating from the router itself, which could indicate a successful compromise.
Compensating Controls: If patching cannot be performed immediately, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 14, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, buffer overflow vulnerabilities in embedded network devices are frequently targeted by threat actors for inclusion in botnets (e.g., Mirai) or for use as a foothold into a target network. The development of a functional exploit is considered highly probable.
Analyst Recommendation
Given the high severity (CVSS 8.8) of this vulnerability and the potential for complete device compromise, immediate action is required. All organizations using affected Linksys products must prioritize the deployment of the vendor-supplied firmware updates to mitigate this risk. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its critical nature warrants urgent attention. If patching is delayed, the compensating controls listed above must be implemented immediately to reduce the attack surface.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
linksys E5600 V1.1.0.26 is vulnerable to command injection in the function ddnsStatus.
linksys E5600 V1.1.0.26 is vulnerable to command injection in the function ddnsStatus.
Executive Summary:
A critical command injection vulnerability has been identified in multiple Linksys products, including the E5600 router. This flaw allows a remote, unauthenticated attacker to execute arbitrary commands on the affected device, potentially leading to a complete system compromise. Successful exploitation could grant an attacker full control over the network device, enabling them to intercept traffic, attack other systems on the network, or disrupt connectivity.
Vulnerability Details
CVE-ID: CVE-2025-29229
Affected Software: linksys Multiple Products
Affected Versions: linksys E5600 V1.1.0.26. See vendor advisory for a complete list of affected products and versions.
Vulnerability: This vulnerability is a command injection flaw within the ddnsStatus function of the device's firmware. The function fails to properly sanitize user-supplied input related to the Dynamic DNS (DDNS) service. An unauthenticated remote attacker can send a specially crafted request to the device's management interface, injecting malicious shell commands into the input fields processed by the ddnsStatus function. These commands are then executed on the underlying operating system with the privileges of the device's web server, which often runs as root, leading to a full system takeover.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a significant risk to the organization. An attacker who successfully exploits this flaw can gain complete administrative control over the network infrastructure device. The potential consequences include interception and theft of sensitive data traversing the network, using the compromised router as a pivot point to launch attacks against internal assets, disrupting network availability (Denial of Service), and installing persistent backdoors or malware. Compromised devices could also be absorbed into a botnet for use in larger-scale attacks against other targets.
Remediation Plan
Immediate Action: Immediately apply the latest firmware updates provided by the vendor across all affected Linksys devices. Consult the official Linksys support website to identify and download the appropriate patches for your specific models. After patching, monitor system and access logs for any signs of compromise that may have occurred prior to remediation.
Proactive Monitoring:
;, |, &&, $()).Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 23, 2025, there is no known public proof-of-concept exploit code or active exploitation of this vulnerability in the wild. However, given the critical CVSS score and the simplicity of exploiting command injection flaws, it is highly probable that threat actors will develop and deploy exploits rapidly.
Analyst Recommendation
The critical severity (CVSS 9.8) of this vulnerability warrants immediate attention and action. We strongly recommend that organizations prioritize the deployment of the vendor-supplied firmware updates to all affected Linksys devices. Although this CVE is not currently listed on the CISA KEV catalog, its characteristics make it a prime candidate for future inclusion. Due to the high risk of complete network compromise, remediation should be treated as an emergency change.
Update linksys Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Linksys E5600 V1.1.0.26 is vulnerable to command injection in the runtime.macClone function via the mc.ip parameter.
Linksys E5600 V1.1.0.26 is vulnerable to command injection in the runtime.macClone function via the mc.ip parameter.
Update Linksys Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A security flaw has been discovered in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1
A security flaw has been discovered in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1
Executive Summary:
A high-severity vulnerability has been discovered in multiple Linksys Wi-Fi range extenders, which could allow an unauthenticated attacker on the local network to take complete control of an affected device. Successful exploitation could lead to network traffic interception, data theft, and the ability to use the compromised device as a pivot point for further attacks on the internal network. Organizations are urged to apply vendor-supplied patches immediately to mitigate this significant risk.
Vulnerability Details
CVE-ID: CVE-2025-14136
Affected Software: Linksys Multiple Products
Affected Versions: See vendor advisory for specific affected versions. The following product models are known to be impacted: RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000 1.
Vulnerability: The vulnerability is a command injection flaw within the web-based management interface of the affected Linksys devices. An unauthenticated attacker on the same network segment can send a specially crafted HTTP request to a specific API endpoint. Due to insufficient input validation, this request can include arbitrary operating system commands, which are then executed on the device with root-level privileges, leading to a full system compromise.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation of this flaw poses a significant risk to the organization. A successful attack would grant an adversary complete control over the network extender, enabling them to monitor, intercept, or redirect all traffic passing through it. This could lead to the theft of sensitive data and user credentials, loss of network integrity, and disruption of business operations. Furthermore, a compromised device could serve as a persistent foothold within the network, allowing the attacker to launch subsequent attacks against other critical internal systems.
Remediation Plan
Immediate Action: Apply vendor security updates immediately across all affected Linksys devices. Prioritize patching devices in critical network segments. Following the update, monitor for any signs of exploitation attempts by reviewing device and network access logs for anomalous activity.
Proactive Monitoring:
Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 7, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, due to the high severity score and the prevalence of these devices, security researchers and threat actors are likely to develop exploits in the near future.
Analyst Recommendation
Given the high-severity CVSS score of 8.8, this vulnerability presents a critical risk that must be addressed urgently. We strongly recommend that organizations immediately identify and apply the vendor-provided security patches to all affected Linksys devices. Although this CVE is not currently listed on the CISA KEV catalog, its characteristics make it a prime candidate for future inclusion and widespread exploitation. Proactive patching and implementation of compensating controls, such as restricting management interface access, are essential to defend against potential attacks.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was identified in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1
A vulnerability was identified in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1
Executive Summary:
A high-severity vulnerability has been discovered in multiple Linksys network extender products. An unauthenticated attacker on the same network could exploit this flaw to gain complete control of an affected device, potentially allowing them to intercept network traffic, access the internal network, and launch further attacks.
Vulnerability Details
CVE-ID: CVE-2025-14135
Affected Software: Linksys Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is likely a command injection or buffer overflow flaw within the web-based management interface of the affected Linksys devices. An unauthenticated attacker on the local network can send a specially crafted HTTP request to the device. Successful exploitation allows the attacker to execute arbitrary commands on the underlying operating system with the highest level of privileges (root), leading to a complete compromise of the device.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit could have a significant business impact by providing an attacker with a foothold into the corporate or home network. Consequences include the ability to conduct Man-in-the-Middle (MitM) attacks to steal sensitive information, pivot to other sensitive systems on the internal network, disrupt network availability, and use the compromised device as part of a larger botnet for launching external attacks.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by Linksys to all affected devices immediately. After patching, administrators should review device and network access logs for any signs of compromise or suspicious activity that may have occurred prior to the update.
Proactive Monitoring: Implement enhanced monitoring for affected devices. Look for unusual outbound connections from the extenders, unexpected reboots, or spikes in network traffic. Review web server access logs on the devices for malformed requests, requests containing special characters or shell commands, or access attempts from unauthorized IP addresses.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 7, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the high severity and the potential for unauthenticated remote code execution, it is highly probable that proof-of-concept exploits will be developed and released by security researchers or malicious actors in the near future.
Analyst Recommendation
Given the high CVSS score and the risk of complete system compromise, this vulnerability presents a critical threat. We strongly recommend that all affected Linksys devices be patched on an emergency basis. Although this CVE is not currently listed on the CISA KEV list, its severity makes it a prime candidate for future inclusion and a high-value target for attackers. Organizations should prioritize this patching effort to prevent network compromise and data exfiltration.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1
A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1
Executive Summary:
A high-severity vulnerability has been identified in multiple Linksys network extender products, assigned CVE-2025-14134 with a CVSS score of 8.8. This flaw could allow a remote attacker to gain control over an affected device, potentially exposing the entire network to further compromise, data theft, or service disruption. Organizations using these devices must take immediate action to apply security patches and mitigate this significant risk.
Vulnerability Details
CVE-ID: CVE-2025-14134
Affected Software: Linksys Multiple Products (RE6500, RE6250, RE6300, RE6350, RE7000, RE9000)
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is likely a form of unauthenticated remote code execution (RCE) within the web management interface of the affected devices. An attacker on the same network segment as the device could send a specially crafted HTTP request to the device's administrative portal. This request could exploit a flaw, such as a command injection or buffer overflow, to execute arbitrary commands on the underlying operating system with root-level privileges, granting the attacker full control over the device without requiring any prior authentication.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8, posing a significant threat to business operations. Successful exploitation would grant an attacker complete control over the network extender, which can then be used as a pivot point into the broader corporate or home network. Potential consequences include interception of sensitive network traffic (man-in-the-middle attacks), deployment of malware, denial-of-service against the network, and unauthorized access to other internal systems and resources, leading to data breaches and operational downtime.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by Linksys immediately. Administrators should navigate to the device's web management interface to check for and install the latest firmware version. Following the update, review device access logs for any unauthorized login attempts or configuration changes that may have occurred prior to patching.
Proactive Monitoring: Monitor network traffic for unusual outbound connections originating from the affected Linksys devices. Security teams should configure log monitoring to alert on repeated failed login attempts or successful logins from unrecognized IP addresses. Network Intrusion Detection Systems (NIDS) should be updated with signatures to detect exploitation attempts related to this CVE as they become available.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Restrict access to the device's web management interface to a dedicated and trusted administrative VLAN or specific IP addresses. Ensure the device is not accessible from the public internet and that it is configured with a strong, unique administrative password.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 7, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, given the high severity (CVSS 8.8) and the widespread deployment of these devices, it is highly probable that security researchers and threat actors will develop exploits in the near future.
Analyst Recommendation
This vulnerability presents a critical risk and must be addressed with urgency. Although CVE-2025-14134 is not currently listed on the CISA KEV catalog, its high severity score indicates a strong potential for widespread impact. We strongly recommend that all organizations immediately identify and patch affected Linksys network extenders. If patching is delayed, the compensating controls listed above should be implemented without delay to mitigate the immediate threat of a network compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1
A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1
Executive Summary:
A critical vulnerability has been discovered in multiple Linksys wireless range extender products, identified as CVE-2025-14133. This high-severity flaw could allow an unauthenticated attacker on the local network to take complete control of an affected device. Successful exploitation could lead to network traffic interception, unauthorized access to the internal network, and service disruption.
Vulnerability Details
CVE-ID: CVE-2025-14133
Affected Software: Linksys Multiple Products
Affected Versions: The vulnerability impacts Linksys models RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000. See the official Linksys vendor advisory for specific affected firmware versions.
Vulnerability: The vulnerability is an unauthenticated command injection flaw in the web-based management interface of the affected devices. An attacker on the same network segment as the device can send a specially crafted HTTP request to a specific API endpoint without needing to provide any credentials. This request can include arbitrary operating system commands, which are then executed on the device with root-level privileges, granting the attacker full control.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would have a significant business impact, as an attacker could gain a persistent foothold within the network. Potential consequences include the ability to monitor, redirect, or block all network traffic passing through the range extender (a man-in-the-middle attack), pivot to attack other sensitive systems on the internal network, exfiltrate confidential data, or disrupt network availability. The compromised device could also be co-opted into a botnet for use in larger-scale attacks against other targets.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately. Administrators should navigate to the Linksys support website, locate the firmware for their specific model, and follow the instructions to upgrade. After patching, review device access logs for any unauthorized or suspicious activity that may have occurred prior to the update.
Proactive Monitoring: Monitor network traffic for unusual outbound connections originating from the Linksys devices, especially to unknown or malicious IP addresses. Review firewall and web server logs for anomalous HTTP requests directed at the devices' management interfaces. System administrators should also be alert for unexplained device reboots or configuration changes.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Restrict network access to the device's web management interface so that it is only accessible from a trusted administrative VLAN or specific IP addresses. Ensure that remote (WAN) management is disabled on all affected devices.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 7, 2025, there are no known public exploits or active in-the-wild exploitation campaigns targeting this vulnerability. However, due to the high severity and ease of exploitation for an attacker with local network access, proof-of-concept (PoC) exploits are likely to be developed and published by security researchers in the near future.
Analyst Recommendation
This vulnerability presents a critical risk to the security of the network. Although it is not currently listed on the CISA KEV catalog, the high CVSS score of 8.8 warrants immediate attention. We strongly recommend that organizations identify all affected Linksys devices within their environment and apply the vendor-supplied firmware updates as the highest priority. If patching cannot be completed immediately, the compensating controls outlined above must be implemented to mitigate the risk of a network breach.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability has been discovered in multiple Linksys network extender products. This flaw could allow an unauthenticated attacker on the local network to gain complete control over the affected devices, potentially leading to network traffic interception, unauthorized access to the internal network, and further system compromise. Immediate application of vendor-provided security updates is required to mitigate this critical risk.
Vulnerability Details
CVE-ID: CVE-2025-9393
Affected Software: Linksys Multiple Products
Affected Versions: See vendor advisory for specific affected versions.
Vulnerability: The vulnerability is an unauthenticated command injection flaw within the web-based management interface of the affected Linksys devices. An attacker with access to the same local network (LAN) as the device can send a specially crafted HTTP request to a specific API endpoint. Due to insufficient input validation, the attacker can inject and execute arbitrary operating system commands with root-level privileges on the device.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation would grant an attacker complete control over the affected network extender. This could lead to significant business disruption, including the ability to intercept sensitive data traversing the network, pivot to attack other critical systems on the internal network, or launch denial-of-service attacks. The compromise of these devices could serve as a persistent foothold for an attacker, leading to data breaches, reputational damage, and operational downtime.
Remediation Plan
Immediate Action: Organizations must immediately identify all affected Linksys devices and apply the security updates provided by the vendor. Firmware updates should be downloaded from the official Linksys support website and applied according to the manufacturer's instructions. After patching, administrators should review device access logs for any signs of compromise prior to the update.
Proactive Monitoring: Implement enhanced monitoring for affected devices. Security teams should look for unusual or malformed HTTP requests to the device's management interface in network traffic and web server logs. Monitor for unexpected outbound connections from the devices, unexplained reboots, or configuration changes that were not authorized by an administrator.
Compensating Controls: If immediate patching is not feasible, implement the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: There is no known public exploit code or active exploitation in the wild as of August 24, 2025. However, vulnerabilities in widely deployed networking equipment are frequently targeted by threat actors and automated botnets once a proof-of-concept exploit is developed. The technical simplicity of a command injection flaw increases the likelihood of a public exploit emerging quickly.
Analyst Recommendation
Due to the high CVSS score of 8.8, this vulnerability poses a significant risk to the organization. We strongly recommend that all affected Linksys models are patched immediately. Although this CVE is not currently listed on the CISA KEV list, its high impact and potential for widespread exploitation make it a critical priority. Organizations should treat this as an urgent threat and complete remediation actions without delay to prevent potential network compromise.