CVE-2025-9361

Linksys · Linksys Multiple Products

A high-severity vulnerability has been identified in multiple Linksys Wi-Fi extender models, carrying a CVSS score of 8.8.

Executive summary

A high-severity vulnerability has been identified in multiple Linksys Wi-Fi extender models, carrying a CVSS score of 8.8. This flaw could allow a remote, unauthenticated attacker to gain complete control over an affected device. Successful exploitation could lead to network traffic interception, unauthorized access to the internal network, and disruption of services.

Vulnerability

The provided description is general, but a CVSS score of 8.8 typically indicates a critical vulnerability, such as unauthenticated remote code execution (RCE). An attacker on the same network segment could likely send a specially crafted request to the device's web management interface to execute arbitrary commands with root-level privileges. This type of exploit generally requires no user interaction or prior authentication, making it highly dangerous and easily weaponized.

Business impact

This is a High severity vulnerability with a CVSS score of 8.8, posing a significant risk to the organization. Successful exploitation would grant an attacker full control over the compromised Wi-Fi extender. This could lead to severe consequences, including an attacker establishing a persistent foothold on the network, intercepting sensitive data passing through the device (Man-in-the-Middle attack), pivoting to attack other internal systems, or using the device in a botnet for DDoS attacks. The compromise of a network infrastructure device can undermine network segmentation and security controls, potentially leading to a full network breach.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor to all affected Linksys devices immediately. After patching, review device access logs and network monitoring data for any signs of compromise that may have occurred prior to the update.

Proactive Monitoring: Implement enhanced monitoring for affected devices. Look for unusual inbound traffic to the device's management interface, unexpected outbound connections from the device to the internet, and any unauthorized configuration changes or device reboots. Network Intrusion Detection Systems (IDS) should be configured with rules to detect common web-based exploitation attempts.

Compensating Controls: If patching cannot be performed immediately, implement compensating controls to reduce the attack surface. Restrict access to the device's web management interface to a dedicated management VLAN or a list of trusted IP addresses. Ensure that remote (WAN) management is disabled, limiting exposure to the local network only.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the High severity (CVSS 8.8) of this vulnerability, immediate patching is the highest priority. Network infrastructure devices like these are prime targets for attackers seeking to gain initial access to a network. Organizations must identify all affected Linksys models on their networks and deploy the vendor-supplied security patches without delay to prevent potential network compromise. If patching is not feasible, the compensating controls listed above should be implemented as an urgent temporary measure.