Skip to main content

CVE-2025-5445: OS Command Injection in Linksys RE6500

Medium
VulnerabilityCVE-2025-5445cvecve-2025-5445
Published: Mon Jun 02 2025 (06/02/2025, 12:31:04 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6500

Description

A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this issue is the function RP_checkFWByBBS of the file /goform/RP_checkFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/11/2025, 08:04:04 UTC

Technical Analysis

CVE-2025-5445 is a critical OS command injection vulnerability affecting multiple Linksys Wi-Fi range extender models, including RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000, across several firmware versions (1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001). The vulnerability resides in the RP_checkFWByBBS function within the /goform/RP_checkFWByBBS endpoint. This function improperly handles several input parameters such as type, ch, ssidhex, security, extch, pwd, mode, ip, nm, and gw, allowing an attacker to inject arbitrary OS commands. The flaw can be exploited remotely without requiring user interaction or authentication, making it highly accessible to attackers. Although the CVSS v4.0 score is 5.3 (medium severity), the nature of OS command injection typically implies a higher risk due to the potential for full system compromise. The vendor, Linksys, was contacted but has not responded or issued a patch, and no known exploits have been observed in the wild yet. This vulnerability could allow attackers to execute arbitrary commands on the device, potentially leading to device takeover, network pivoting, data interception, or disruption of network services. The affected devices are commonly used in home and small office environments to extend Wi-Fi coverage, often connected to critical network infrastructure.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Linksys range extenders, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to internal networks, interception of sensitive data, and lateral movement to other devices within the network. Given the devices' role in extending Wi-Fi coverage, attackers could disrupt network availability or use compromised extenders as footholds for further attacks. The lack of vendor response and patches increases the window of exposure. Organizations in Europe with remote or hybrid work setups that depend on these extenders for connectivity may face increased risk of espionage, data breaches, or service disruption. Additionally, critical infrastructure entities using these devices could be targeted for sabotage or espionage, amplifying the threat's impact.

Mitigation Recommendations

Immediate mitigation should focus on network segmentation to isolate vulnerable Linksys extenders from critical systems and sensitive data. Disable remote management interfaces on these devices to reduce exposure. Monitor network traffic for unusual patterns originating from or targeting these extenders. Employ network intrusion detection systems (NIDS) with signatures for command injection attempts. Where possible, replace affected devices with models from vendors providing timely security updates. If replacement is not feasible, consider deploying firewall rules to restrict access to the vulnerable endpoints (/goform/RP_checkFWByBBS). Regularly audit device firmware versions and configurations. Since no patches are available, organizations should engage with Linksys support channels persistently and monitor for any future updates. Educate users about the risks and encourage reporting of unusual device behavior. Finally, maintain robust network logging to facilitate incident response in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-01T17:06:33.558Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683dd12a182aa0cae24c049f

Added to database: 6/2/2025, 4:28:26 PM

Last enriched: 7/11/2025, 8:04:04 AM

Last updated: 7/30/2025, 4:11:48 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats