CVE-2025-5445: OS Command Injection in Linksys RE6500
A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this issue is the function RP_checkFWByBBS of the file /goform/RP_checkFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-5445 is a critical OS command injection vulnerability affecting multiple Linksys Wi-Fi range extender models, including RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000, across several firmware versions (1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001). The vulnerability resides in the RP_checkFWByBBS function within the /goform/RP_checkFWByBBS endpoint. This function improperly handles several input parameters such as type, ch, ssidhex, security, extch, pwd, mode, ip, nm, and gw, allowing an attacker to inject arbitrary OS commands. The flaw can be exploited remotely without requiring user interaction or authentication, making it highly accessible to attackers. Although the CVSS v4.0 score is 5.3 (medium severity), the nature of OS command injection typically implies a higher risk due to the potential for full system compromise. The vendor, Linksys, was contacted but has not responded or issued a patch, and no known exploits have been observed in the wild yet. This vulnerability could allow attackers to execute arbitrary commands on the device, potentially leading to device takeover, network pivoting, data interception, or disruption of network services. The affected devices are commonly used in home and small office environments to extend Wi-Fi coverage, often connected to critical network infrastructure.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Linksys range extenders, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to internal networks, interception of sensitive data, and lateral movement to other devices within the network. Given the devices' role in extending Wi-Fi coverage, attackers could disrupt network availability or use compromised extenders as footholds for further attacks. The lack of vendor response and patches increases the window of exposure. Organizations in Europe with remote or hybrid work setups that depend on these extenders for connectivity may face increased risk of espionage, data breaches, or service disruption. Additionally, critical infrastructure entities using these devices could be targeted for sabotage or espionage, amplifying the threat's impact.
Mitigation Recommendations
Immediate mitigation should focus on network segmentation to isolate vulnerable Linksys extenders from critical systems and sensitive data. Disable remote management interfaces on these devices to reduce exposure. Monitor network traffic for unusual patterns originating from or targeting these extenders. Employ network intrusion detection systems (NIDS) with signatures for command injection attempts. Where possible, replace affected devices with models from vendors providing timely security updates. If replacement is not feasible, consider deploying firewall rules to restrict access to the vulnerable endpoints (/goform/RP_checkFWByBBS). Regularly audit device firmware versions and configurations. Since no patches are available, organizations should engage with Linksys support channels persistently and monitor for any future updates. Educate users about the risks and encourage reporting of unusual device behavior. Finally, maintain robust network logging to facilitate incident response in case of exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-5445: OS Command Injection in Linksys RE6500
Description
A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this issue is the function RP_checkFWByBBS of the file /goform/RP_checkFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-5445 is a critical OS command injection vulnerability affecting multiple Linksys Wi-Fi range extender models, including RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000, across several firmware versions (1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001). The vulnerability resides in the RP_checkFWByBBS function within the /goform/RP_checkFWByBBS endpoint. This function improperly handles several input parameters such as type, ch, ssidhex, security, extch, pwd, mode, ip, nm, and gw, allowing an attacker to inject arbitrary OS commands. The flaw can be exploited remotely without requiring user interaction or authentication, making it highly accessible to attackers. Although the CVSS v4.0 score is 5.3 (medium severity), the nature of OS command injection typically implies a higher risk due to the potential for full system compromise. The vendor, Linksys, was contacted but has not responded or issued a patch, and no known exploits have been observed in the wild yet. This vulnerability could allow attackers to execute arbitrary commands on the device, potentially leading to device takeover, network pivoting, data interception, or disruption of network services. The affected devices are commonly used in home and small office environments to extend Wi-Fi coverage, often connected to critical network infrastructure.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Linksys range extenders, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to internal networks, interception of sensitive data, and lateral movement to other devices within the network. Given the devices' role in extending Wi-Fi coverage, attackers could disrupt network availability or use compromised extenders as footholds for further attacks. The lack of vendor response and patches increases the window of exposure. Organizations in Europe with remote or hybrid work setups that depend on these extenders for connectivity may face increased risk of espionage, data breaches, or service disruption. Additionally, critical infrastructure entities using these devices could be targeted for sabotage or espionage, amplifying the threat's impact.
Mitigation Recommendations
Immediate mitigation should focus on network segmentation to isolate vulnerable Linksys extenders from critical systems and sensitive data. Disable remote management interfaces on these devices to reduce exposure. Monitor network traffic for unusual patterns originating from or targeting these extenders. Employ network intrusion detection systems (NIDS) with signatures for command injection attempts. Where possible, replace affected devices with models from vendors providing timely security updates. If replacement is not feasible, consider deploying firewall rules to restrict access to the vulnerable endpoints (/goform/RP_checkFWByBBS). Regularly audit device firmware versions and configurations. Since no patches are available, organizations should engage with Linksys support channels persistently and monitor for any future updates. Educate users about the risks and encourage reporting of unusual device behavior. Finally, maintain robust network logging to facilitate incident response in case of exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-01T17:06:33.558Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683dd12a182aa0cae24c049f
Added to database: 6/2/2025, 4:28:26 PM
Last enriched: 7/11/2025, 8:04:04 AM
Last updated: 7/30/2025, 4:11:48 PM
Views: 17
Related Threats
CVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighCVE-2025-40768: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens SINEC Traffic Analyzer
HighCVE-2025-40767: CWE-250: Execution with Unnecessary Privileges in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.