Skip to main content

CVE-2025-5438: Command Injection in Linksys RE6500

Medium
VulnerabilityCVE-2025-5438cvecve-2025-5438
Published: Mon Jun 02 2025 (06/02/2025, 09:00:19 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6500

Description

A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been declared as critical. Affected by this vulnerability is the function WPS of the file /goform/WPS. The manipulation of the argument PIN leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/09/2025, 12:55:16 UTC

Technical Analysis

CVE-2025-5438 is a command injection vulnerability affecting multiple Linksys range extender models, including RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the WPS (Wi-Fi Protected Setup) functionality, particularly in the /goform/WPS endpoint. An attacker can manipulate the 'PIN' argument sent to this endpoint to inject arbitrary commands that the device executes. This flaw allows remote exploitation without requiring user interaction or authentication, making it particularly dangerous. Although the CVSS v4.0 base score is 5.3 (medium severity), the ability to execute commands remotely elevates the risk profile. The vendor, Linksys, was notified early but has not responded or released patches, and no official fixes or mitigations have been published. While no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the likelihood of active exploitation. The vulnerability impacts the confidentiality, integrity, and availability of the affected devices, potentially allowing attackers to take full control, disrupt network connectivity, or pivot into internal networks.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and small-to-medium businesses relying on Linksys range extenders to improve wireless coverage. Compromise of these devices can lead to unauthorized network access, interception of sensitive communications, and lateral movement within corporate networks. Given that these devices often reside at network edges or in less monitored segments, attackers could establish persistent footholds. The lack of vendor response and patches means organizations may face prolonged exposure. Additionally, critical infrastructure sectors using these devices for network extension could experience service disruptions or data breaches. The medium CVSS score may underestimate the real-world impact due to the ease of remote exploitation without authentication. The threat is exacerbated by the public availability of exploit code, increasing the risk of automated attacks targeting vulnerable devices across Europe.

Mitigation Recommendations

Organizations should immediately inventory their network infrastructure to identify the presence of affected Linksys range extender models and firmware versions. Until official patches are available, it is advisable to disable WPS functionality on these devices, as the vulnerability is tied to the WPS endpoint. If disabling WPS is not feasible, isolating the devices on segmented network zones with strict firewall rules to limit inbound access to the management interface can reduce exposure. Network monitoring should be enhanced to detect unusual command execution patterns or unexpected traffic to /goform/WPS endpoints. Employing network intrusion detection systems (NIDS) with signatures for known exploit attempts can provide early warning. Where possible, replace vulnerable devices with updated hardware from vendors with active security support. Organizations should also engage with Linksys support channels to demand timely patches and monitor vulnerability databases for updates. Finally, educating IT staff about this specific threat can improve incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-01T17:06:14.336Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683d6b34182aa0cae23cac68

Added to database: 6/2/2025, 9:13:24 AM

Last enriched: 7/9/2025, 12:55:16 PM

Last updated: 8/18/2025, 11:29:55 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats