CVE-2025-9392

Linksys · Linksys RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000

A high-severity vulnerability has been discovered in multiple Linksys network extender products, identified as CVE-2025-9392.

Executive summary

A high-severity vulnerability has been discovered in multiple Linksys network extender products, identified as CVE-2025-9392. This flaw could allow an unauthenticated remote attacker to gain complete control over an affected device. Successful exploitation could lead to network traffic interception, unauthorized access to the internal network, and significant operational disruption.

Vulnerability

This vulnerability is an unauthenticated command injection flaw in the web-based management interface of the affected devices. An attacker can exploit this by sending a specially crafted HTTP request to the device's web server. The input is not properly sanitized, allowing the attacker to inject and execute arbitrary operating system commands with root-level privileges, resulting in a complete compromise of the device.

Business impact

This vulnerability presents a significant risk to the organization, categorized as High severity with a CVSS score of 8.8. An attacker who successfully exploits this flaw can gain a foothold within the network perimeter. Potential consequences include eavesdropping on network traffic, performing man-in-the-middle attacks to steal sensitive data, using the compromised device to launch attacks against other internal systems, or causing a denial-of-service condition by disrupting network connectivity. This could lead to data breaches, operational downtime, and reputational damage.

Remediation

Immediate Action:

  • Immediately identify all affected Linksys devices on the network.
  • Apply the security updates and firmware patches provided by Linksys as a top priority.
  • After patching, monitor device logs and network traffic for any signs of compromise or further exploitation attempts. Review historical access logs for indicators of compromise preceding the patch.

Proactive Monitoring:

  • Monitor network traffic for unusual outbound connections originating from the Linksys devices.
  • Implement logging for the device's web management interface and review for anomalous or malformed HTTP requests.
  • Utilize network intrusion detection/prevention systems (NIDS/NIPS) with updated signatures to detect and block potential exploit traffic targeting this vulnerability.

Compensating Controls:

  • If immediate patching is not feasible, restrict access to the device's web management interface to a trusted and isolated management network segment.
  • Ensure the management interface is not exposed to the internet.
  • Implement network segmentation to limit the potential impact of a compromised device on other critical network assets.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the risk of complete network compromise, this vulnerability should be treated as a critical priority. We strongly recommend that organizations apply the vendor-supplied patches to all affected Linksys devices immediately, in accordance with emergency patching timelines. Although this CVE is not currently listed on the CISA KEV catalog, its severity makes it a likely candidate for future inclusion. Proactive patching is the most effective defense against potential future exploitation.