CVE-2025-5446: OS Command Injection in Linksys RE6500
A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been classified as critical. This affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. The manipulation of the argument pwd leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-5446 is a security vulnerability identified in several Linksys Wi-Fi range extender models, including RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000, specifically affecting firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the RP_checkCredentialsByBBS function within the /goform/RP_checkCredentialsByBBS endpoint. It is an OS command injection flaw triggered by manipulation of the 'pwd' argument. This allows an unauthenticated remote attacker to execute arbitrary operating system commands on the device. The vulnerability does not require user interaction or prior authentication, making it remotely exploitable over the network. Despite the critical nature of command injection vulnerabilities, this issue has been assigned a medium severity rating with a CVSS 4.0 score of 5.3, reflecting some mitigating factors such as limited scope or impact on confidentiality, integrity, and availability. The vendor has been contacted but has not responded or issued a patch, and no known exploits have been observed in the wild yet. The public disclosure of this vulnerability increases the risk of exploitation by attackers targeting vulnerable Linksys range extenders to gain control over the device, potentially pivoting into internal networks or disrupting network availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those relying on Linksys range extenders in their network infrastructure. Successful exploitation could lead to unauthorized remote code execution, allowing attackers to compromise device integrity, intercept or manipulate network traffic, or use the device as a foothold for lateral movement within corporate networks. This can result in data breaches, service disruptions, or deployment of further malware. Small and medium enterprises (SMEs) and home offices using these devices without timely firmware updates are particularly vulnerable. The lack of vendor response and patches increases exposure time. Given the widespread use of Linksys products in Europe, especially in countries with high adoption of consumer networking equipment in business environments, the threat could impact confidentiality and availability of network services. Additionally, compromised devices could be leveraged in botnets or for launching attacks against other targets, amplifying the threat landscape.
Mitigation Recommendations
Organizations should immediately inventory their network to identify the presence of affected Linksys range extender models and firmware versions. Where possible, isolate these devices from critical network segments or the internet to reduce exposure. Since no official patches are available, consider temporary mitigations such as disabling remote management interfaces or restricting access to the vulnerable endpoint via firewall rules. Network monitoring should be enhanced to detect anomalous command execution or unusual traffic patterns originating from these devices. If replacement is feasible, upgrade to newer, unaffected hardware or firmware versions once available. Engage with Linksys support channels for updates and advisories. Additionally, implement network segmentation and zero-trust principles to limit the impact of any compromised device. Regularly update device firmware and maintain a vulnerability management program to quickly respond to emerging threats.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-5446: OS Command Injection in Linksys RE6500
Description
A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been classified as critical. This affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. The manipulation of the argument pwd leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-5446 is a security vulnerability identified in several Linksys Wi-Fi range extender models, including RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000, specifically affecting firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the RP_checkCredentialsByBBS function within the /goform/RP_checkCredentialsByBBS endpoint. It is an OS command injection flaw triggered by manipulation of the 'pwd' argument. This allows an unauthenticated remote attacker to execute arbitrary operating system commands on the device. The vulnerability does not require user interaction or prior authentication, making it remotely exploitable over the network. Despite the critical nature of command injection vulnerabilities, this issue has been assigned a medium severity rating with a CVSS 4.0 score of 5.3, reflecting some mitigating factors such as limited scope or impact on confidentiality, integrity, and availability. The vendor has been contacted but has not responded or issued a patch, and no known exploits have been observed in the wild yet. The public disclosure of this vulnerability increases the risk of exploitation by attackers targeting vulnerable Linksys range extenders to gain control over the device, potentially pivoting into internal networks or disrupting network availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those relying on Linksys range extenders in their network infrastructure. Successful exploitation could lead to unauthorized remote code execution, allowing attackers to compromise device integrity, intercept or manipulate network traffic, or use the device as a foothold for lateral movement within corporate networks. This can result in data breaches, service disruptions, or deployment of further malware. Small and medium enterprises (SMEs) and home offices using these devices without timely firmware updates are particularly vulnerable. The lack of vendor response and patches increases exposure time. Given the widespread use of Linksys products in Europe, especially in countries with high adoption of consumer networking equipment in business environments, the threat could impact confidentiality and availability of network services. Additionally, compromised devices could be leveraged in botnets or for launching attacks against other targets, amplifying the threat landscape.
Mitigation Recommendations
Organizations should immediately inventory their network to identify the presence of affected Linksys range extender models and firmware versions. Where possible, isolate these devices from critical network segments or the internet to reduce exposure. Since no official patches are available, consider temporary mitigations such as disabling remote management interfaces or restricting access to the vulnerable endpoint via firewall rules. Network monitoring should be enhanced to detect anomalous command execution or unusual traffic patterns originating from these devices. If replacement is feasible, upgrade to newer, unaffected hardware or firmware versions once available. Engage with Linksys support channels for updates and advisories. Additionally, implement network segmentation and zero-trust principles to limit the impact of any compromised device. Regularly update device firmware and maintain a vulnerability management program to quickly respond to emerging threats.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-01T17:06:36.240Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683dd85d182aa0cae24d816c
Added to database: 6/2/2025, 4:59:09 PM
Last enriched: 7/11/2025, 8:16:40 AM
Last updated: 10/7/2025, 1:44:45 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.