CVE-2025-9363
Linksys · Linksys Multiple Products
A high-severity vulnerability has been discovered in multiple Linksys Wi-Fi extender models.
Executive summary
A high-severity vulnerability has been discovered in multiple Linksys Wi-Fi extender models. This flaw allows an unauthenticated attacker on the local network to gain complete control over affected devices. Successful exploitation could lead to network traffic interception, unauthorized access to the internal network, and further system compromise.
Vulnerability
The vulnerability is an unauthenticated command injection flaw within the web-based management interface of the affected Linksys devices. An attacker on the same local network can send a specially crafted HTTP request to a specific API endpoint on the device. Due to insufficient input sanitization, this allows the attacker to execute arbitrary commands on the device's underlying operating system with root-level privileges, requiring no prior authentication.
Business impact
This vulnerability presents a high-severity risk to the organization, reflected by its CVSS score of 8.8. An attacker successfully exploiting this flaw could gain complete administrative control over the network extenders. This could lead to significant business disruption, including the interception of sensitive internal network traffic, unauthorized access to other critical systems, and the ability to launch further attacks from a trusted internal position. A compromised device could also be incorporated into a botnet, potentially causing reputational damage.
Remediation
Immediate Action: Immediately apply the security updates released by Linksys to all affected Wi-Fi extender models. Prioritize patching for devices that are accessible from less trusted network segments. After patching, verify that the update was successful and the device is operating normally.
Proactive Monitoring: Monitor web server access logs on the Linksys devices for unusual or malformed HTTP requests, particularly those targeting administrative functions from unexpected internal IP addresses. Network Intrusion Detection Systems (NIDS) should be configured with signatures to detect command injection attempts. Monitor for anomalous outbound traffic from the extenders, which could indicate a successful compromise and communication with a command-and-control server.
Compensating Controls: If immediate patching is not feasible, restrict access to the device's web management interface to a limited set of trusted administrative IP addresses using network access control lists (ACLs). If the functionality is not required, consider disabling the web interface on untrusted network segments.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to the high severity of this vulnerability, immediate action is required. We recommend that all affected Linksys Wi-Fi extenders identified within the organization be patched immediately following the vendor's advisory. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high impact and the potential for a simple exploit mean it is a prime target for future exploitation. Organizations should treat this as a critical priority for their patch management cycle to prevent potential network compromise.