CVE-2025-5444: OS Command Injection in Linksys RE6500
A vulnerability has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this vulnerability is the function RP_UpgradeFWByBBS of the file /goform/RP_UpgradeFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-5444 is a critical OS command injection vulnerability affecting multiple Linksys range extender models, including RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000, across several firmware versions (1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001). The vulnerability resides in the RP_UpgradeFWByBBS function within the /goform/RP_UpgradeFWByBBS endpoint. Specifically, the vulnerability arises from improper sanitization of multiple input parameters such as type, ch, ssidhex, security, extch, pwd, mode, ip, nm, and gw. An attacker can remotely manipulate these parameters to inject arbitrary OS commands, which the device executes with elevated privileges. This flaw does not require authentication or user interaction, making it remotely exploitable over the network. The vendor has been notified but has not responded or issued patches, and public exploit code has been disclosed, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low attack complexity, and no required authentication, but limited impact on confidentiality, integrity, and availability. However, the potential for command injection on network infrastructure devices like Wi-Fi extenders can lead to device compromise, network pivoting, or denial of service. The lack of vendor response and public exploit availability heighten the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Linksys range extenders are commonly used in both residential and small to medium enterprise environments to enhance wireless coverage. Compromise of these devices can allow attackers to execute arbitrary commands, potentially leading to unauthorized network access, interception or manipulation of network traffic, and lateral movement within corporate networks. This can result in data breaches, disruption of business operations, and erosion of trust in network infrastructure. Additionally, compromised extenders could be used as footholds for launching further attacks or as part of botnets. Given the devices often operate at network perimeters or in less monitored segments, detection and response may be delayed. The absence of vendor patches and the public availability of exploits increase the likelihood of attacks targeting European networks, especially in sectors relying heavily on wireless connectivity and remote work setups.
Mitigation Recommendations
Organizations should immediately inventory their network to identify any affected Linksys extender models and firmware versions. As no official patches are currently available, the following specific mitigations are recommended: 1) Isolate affected devices on segmented network zones with strict access controls to limit exposure; 2) Disable remote management interfaces and restrict local management access to trusted administrators only; 3) Monitor network traffic for unusual patterns or commands targeting the /goform/RP_UpgradeFWByBBS endpoint; 4) Employ network intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts; 5) Consider replacing vulnerable devices with models from vendors providing timely security updates; 6) Regularly update firmware when vendor patches become available; 7) Educate IT staff about this vulnerability and ensure incident response plans include steps for compromised network devices. These targeted actions go beyond generic advice by focusing on network segmentation, access restriction, and proactive monitoring specific to this vulnerability's exploitation vector.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-5444: OS Command Injection in Linksys RE6500
Description
A vulnerability has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this vulnerability is the function RP_UpgradeFWByBBS of the file /goform/RP_UpgradeFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-5444 is a critical OS command injection vulnerability affecting multiple Linksys range extender models, including RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000, across several firmware versions (1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001). The vulnerability resides in the RP_UpgradeFWByBBS function within the /goform/RP_UpgradeFWByBBS endpoint. Specifically, the vulnerability arises from improper sanitization of multiple input parameters such as type, ch, ssidhex, security, extch, pwd, mode, ip, nm, and gw. An attacker can remotely manipulate these parameters to inject arbitrary OS commands, which the device executes with elevated privileges. This flaw does not require authentication or user interaction, making it remotely exploitable over the network. The vendor has been notified but has not responded or issued patches, and public exploit code has been disclosed, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low attack complexity, and no required authentication, but limited impact on confidentiality, integrity, and availability. However, the potential for command injection on network infrastructure devices like Wi-Fi extenders can lead to device compromise, network pivoting, or denial of service. The lack of vendor response and public exploit availability heighten the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Linksys range extenders are commonly used in both residential and small to medium enterprise environments to enhance wireless coverage. Compromise of these devices can allow attackers to execute arbitrary commands, potentially leading to unauthorized network access, interception or manipulation of network traffic, and lateral movement within corporate networks. This can result in data breaches, disruption of business operations, and erosion of trust in network infrastructure. Additionally, compromised extenders could be used as footholds for launching further attacks or as part of botnets. Given the devices often operate at network perimeters or in less monitored segments, detection and response may be delayed. The absence of vendor patches and the public availability of exploits increase the likelihood of attacks targeting European networks, especially in sectors relying heavily on wireless connectivity and remote work setups.
Mitigation Recommendations
Organizations should immediately inventory their network to identify any affected Linksys extender models and firmware versions. As no official patches are currently available, the following specific mitigations are recommended: 1) Isolate affected devices on segmented network zones with strict access controls to limit exposure; 2) Disable remote management interfaces and restrict local management access to trusted administrators only; 3) Monitor network traffic for unusual patterns or commands targeting the /goform/RP_UpgradeFWByBBS endpoint; 4) Employ network intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts; 5) Consider replacing vulnerable devices with models from vendors providing timely security updates; 6) Regularly update firmware when vendor patches become available; 7) Educate IT staff about this vulnerability and ensure incident response plans include steps for compromised network devices. These targeted actions go beyond generic advice by focusing on network segmentation, access restriction, and proactive monitoring specific to this vulnerability's exploitation vector.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-01T17:06:30.726Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683d9584182aa0cae242f8ac
Added to database: 6/2/2025, 12:13:56 PM
Last enriched: 7/11/2025, 8:03:53 AM
Last updated: 8/11/2025, 12:15:17 PM
Views: 18
Related Threats
CVE-2025-34154: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Synergetic Data Systems Inc. UnForm Server Manager
CriticalCVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-43988: n/a
CriticalCVE-2025-8926: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-43986: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.