CVE-2025-9357

Linksys · Linksys Multiple Products

A high-severity vulnerability has been discovered in multiple Linksys Wi-Fi range extenders, allowing an unauthenticated attacker on the local network to take complete control of affected devices.

Executive summary

A high-severity vulnerability has been discovered in multiple Linksys Wi-Fi range extenders, allowing an unauthenticated attacker on the local network to take complete control of affected devices. Successful exploitation could lead to network traffic interception, unauthorized access to the internal network, and service disruption. Organizations are urged to apply the vendor-supplied security updates immediately to mitigate this critical risk.

Vulnerability

The vulnerability is an unauthenticated command injection flaw in the web management interface of the affected devices. An attacker with access to the same local area network (LAN) can send a specially crafted HTTP request to a specific API endpoint. Due to insufficient input validation, the attacker's malicious commands are executed on the underlying operating system with the highest privileges (root), leading to a full compromise of the device.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would grant an attacker complete administrative control over the affected Linksys device. This could have severe business consequences, including the interception of sensitive corporate and personal data, disruption of network connectivity, and the use of the compromised device as a pivot point to launch further attacks against other critical assets on the internal network. The risk includes data breaches, operational downtime, and reputational damage.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately. Administrators should navigate to the Linksys support website, locate the firmware downloads for their specific model, and follow the instructions to update the device. After patching, monitor device logs and network traffic for any signs of compromise that may have occurred prior to the update.

Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes reviewing web access logs on the devices for unusual or malformed requests, monitoring for unexpected outbound connections from the Linksys extenders, and looking for anomalous network traffic patterns. Set up alerts for any unauthorized configuration changes or device reboots.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:

  • Restrict access to the device's web management interface to a limited set of trusted administrative IP addresses.
  • Ensure the management interface is not accessible from guest or other untrusted network segments.
  • Employ network segmentation to isolate the affected devices from critical servers and sensitive corporate resources.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8, this vulnerability poses a significant and immediate threat to the network. We strongly recommend that organizations identify all affected Linksys devices within their environment and prioritize applying the vendor-provided firmware updates without delay. Although this CVE is not currently on the CISA KEV list, its critical nature makes it a prime candidate for future inclusion and a high-value target for attackers. Proactive patching is the most effective defense against potential compromise.