Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60689: n/a

0
Medium
VulnerabilityCVE-2025-60689cvecve-2025-60689
Published: Thu Nov 13 2025 (11/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An unauthenticated command injection vulnerability exists in the Start_EPI function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The vulnerability occurs because user-supplied CGI parameters (wl_ant, wl_ssid, wl_rate, ttcp_num, ttcp_ip, ttcp_size) are concatenated into system command strings without proper sanitization and executed via wl_exec_cmd. Successful exploitation allows remote attackers to execute arbitrary commands on the device without authentication.

AI-Powered Analysis

AILast updated: 11/13/2025, 16:59:01 UTC

Technical Analysis

CVE-2025-60689 is a critical security vulnerability identified in the Linksys E1200 version 2 routers, specifically in the Start_EPI function of the httpd binary within the firmware version E1200_v2.0.11.001_us. The vulnerability is a classic command injection flaw caused by improper input sanitization of CGI parameters (wl_ant, wl_ssid, wl_rate, ttcp_num, ttcp_ip, ttcp_size). These parameters are concatenated directly into system command strings executed via the wl_exec_cmd function without validation or escaping, enabling an attacker to inject arbitrary shell commands. Because the vulnerability is unauthenticated, any remote attacker with network access to the device’s HTTP interface can exploit it without credentials or user interaction. Successful exploitation allows full arbitrary command execution on the router, potentially leading to device takeover, network reconnaissance, lateral movement, or persistent backdoors. The firmware version affected is specifically E1200_v2.0.11.001_us, indicating a narrow but critical attack surface. No CVSS score has been assigned yet, and no public exploits are currently reported. The vulnerability was reserved in late September 2025 and published in November 2025, indicating recent discovery. The lack of patches or mitigation details suggests that vendors and users must act cautiously and monitor for updates. Given the router’s role as a network gateway device, compromise could impact confidentiality, integrity, and availability of connected networks and devices.

Potential Impact

For European organizations, the impact of CVE-2025-60689 can be severe. Linksys E1200 v2 routers are commonly used in small to medium business and home office environments, which are often less rigorously secured than enterprise-grade infrastructure. Exploitation could allow attackers to gain persistent control over the network gateway, enabling interception or manipulation of network traffic, deployment of malware, or pivoting into internal networks. This could lead to data breaches, disruption of business operations, or use of compromised routers as part of larger botnets or attack campaigns. Critical infrastructure sectors relying on these routers for remote sites or branch offices may face operational disruptions or espionage risks. The unauthenticated nature of the vulnerability increases the likelihood of exploitation by opportunistic attackers or automated scanning tools. The absence of known exploits currently limits immediate widespread impact but also means defenders must proactively address the risk before exploitation becomes common. The impact extends beyond the device itself to the broader network security posture of affected organizations.

Mitigation Recommendations

1. Immediately isolate Linksys E1200 v2 routers running firmware E1200_v2.0.11.001_us from untrusted networks to prevent remote exploitation. 2. Monitor vendor communications closely for firmware updates or patches addressing CVE-2025-60689 and apply them promptly once available. 3. Restrict access to the router’s HTTP management interface using network segmentation, firewall rules, or VPNs to limit exposure to trusted administrators only. 4. Disable remote management features if not strictly necessary, especially HTTP-based management interfaces. 5. Implement network-level intrusion detection or prevention systems to detect anomalous command injection attempts targeting router CGI parameters. 6. Conduct network audits to identify all instances of Linksys E1200 v2 routers and verify firmware versions to prioritize remediation efforts. 7. Consider replacing vulnerable devices with newer, supported hardware if patches are delayed or unavailable. 8. Educate IT staff on recognizing signs of router compromise, such as unexpected configuration changes or unusual network traffic patterns. 9. Employ strong network segmentation to limit lateral movement if a router is compromised. 10. Maintain regular backups of router configurations to enable rapid recovery after remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69160e4773934fe85f031b0d

Added to database: 11/13/2025, 4:58:47 PM

Last enriched: 11/13/2025, 4:59:01 PM

Last updated: 11/15/2025, 6:36:10 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats