Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34037: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Linksys E4200

0
Critical
VulnerabilityCVE-2025-34037cvecve-2025-34037cwe-78
Published: Tue Jun 24 2025 (06/24/2025, 01:03:27 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: E4200

Description

An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability is exploited in the wild by the "TheMoon" worm to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. This vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.

AI-Powered Analysis

AILast updated: 11/24/2025, 22:43:30 UTC

Technical Analysis

CVE-2025-34037 is an OS command injection vulnerability identified in Linksys E4200 routers, specifically within the /tmUnblock.cgi and /hndUnblock.cgi CGI endpoints accessible over HTTP on port 8080. The vulnerability stems from improper neutralization of special elements in the ttcp_ip parameter, which is user-supplied input that the CGI scripts fail to sanitize correctly. This flaw allows unauthenticated remote attackers to inject arbitrary shell commands, leading to arbitrary code execution on the device. The vulnerability is exploited in the wild by a worm named 'TheMoon,' which targets vulnerable devices to deploy a MIPS ELF payload, effectively compromising the router. Although initially reported on the E4200 model, other Linksys products including WAG, WAP, WES, WET, WRT-series routers, and Wireless-N access points may also be affected due to similar firmware components. The vulnerability was observed being exploited as early as February 6, 2025, by the Shadowserver Foundation. The CVSS 4.0 base score is 10.0, reflecting a critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability allows attackers to take full control of the device, potentially enabling network pivoting, data interception, or denial of service. No official patches were listed at the time of reporting, increasing the urgency for mitigation through network controls and monitoring.

Potential Impact

For European organizations, this vulnerability poses a severe risk to network infrastructure security. Compromise of Linksys E4200 or related routers can lead to full device takeover, allowing attackers to intercept, manipulate, or disrupt network traffic. This can result in data breaches, loss of service, and lateral movement within corporate networks. Critical infrastructure operators, SMEs, and enterprises relying on these routers for internet connectivity or VPN termination are particularly vulnerable. The worm-based exploitation increases the risk of rapid propagation across networks, potentially causing widespread outages or facilitating further malware deployment. Additionally, compromised routers can serve as footholds for attackers to launch attacks against other internal systems or external targets. The lack of authentication and ease of exploitation means even low-skilled attackers can leverage this vulnerability, amplifying the threat landscape across Europe.

Mitigation Recommendations

1. Immediately restrict access to router management interfaces, especially HTTP port 8080, by implementing firewall rules or network segmentation to limit exposure to trusted networks only. 2. Disable remote management features on affected devices if not strictly necessary. 3. Monitor network traffic for unusual activity, particularly outbound connections from routers that may indicate worm propagation or payload deployment. 4. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures targeting 'TheMoon' worm and related exploitation attempts. 5. Regularly audit and inventory network devices to identify vulnerable Linksys models and prioritize their remediation. 6. Apply vendor firmware updates or patches as soon as they become available; if no official patch exists, consider replacing affected devices with models from vendors with active security support. 7. Educate network administrators on the risks of exposed management interfaces and enforce strong network security policies. 8. Implement network anomaly detection to identify compromised devices early. 9. Use network access control (NAC) to prevent unauthorized devices from connecting to critical segments. 10. Maintain backups of router configurations to enable rapid recovery after compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.546Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6859fad3dec26fc862d8c385

Added to database: 6/24/2025, 1:09:39 AM

Last enriched: 11/24/2025, 10:43:30 PM

Last updated: 1/7/2026, 5:26:13 AM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats