CVE-2025-60689: n/a
An unauthenticated command injection vulnerability exists in the Start_EPI function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The vulnerability occurs because user-supplied CGI parameters (wl_ant, wl_ssid, wl_rate, ttcp_num, ttcp_ip, ttcp_size) are concatenated into system command strings without proper sanitization and executed via wl_exec_cmd. Successful exploitation allows remote attackers to execute arbitrary commands on the device without authentication.
AI Analysis
Technical Summary
CVE-2025-60689 is a critical security vulnerability identified in the Linksys E1200 version 2 routers, specifically in the Start_EPI function of the httpd binary within the firmware version E1200_v2.0.11.001_us. The vulnerability is a classic command injection flaw caused by improper input sanitization of CGI parameters (wl_ant, wl_ssid, wl_rate, ttcp_num, ttcp_ip, ttcp_size). These parameters are concatenated directly into system command strings executed via the wl_exec_cmd function without validation or escaping, enabling an attacker to inject arbitrary shell commands. Because the vulnerability is unauthenticated, any remote attacker with network access to the device’s HTTP interface can exploit it without credentials or user interaction. Successful exploitation allows full arbitrary command execution on the router, potentially leading to device takeover, network reconnaissance, lateral movement, or persistent backdoors. The firmware version affected is specifically E1200_v2.0.11.001_us, indicating a narrow but critical attack surface. No CVSS score has been assigned yet, and no public exploits are currently reported. The vulnerability was reserved in late September 2025 and published in November 2025, indicating recent discovery. The lack of patches or mitigation details suggests that vendors and users must act cautiously and monitor for updates. Given the router’s role as a network gateway device, compromise could impact confidentiality, integrity, and availability of connected networks and devices.
Potential Impact
For European organizations, the impact of CVE-2025-60689 can be severe. Linksys E1200 v2 routers are commonly used in small to medium business and home office environments, which are often less rigorously secured than enterprise-grade infrastructure. Exploitation could allow attackers to gain persistent control over the network gateway, enabling interception or manipulation of network traffic, deployment of malware, or pivoting into internal networks. This could lead to data breaches, disruption of business operations, or use of compromised routers as part of larger botnets or attack campaigns. Critical infrastructure sectors relying on these routers for remote sites or branch offices may face operational disruptions or espionage risks. The unauthenticated nature of the vulnerability increases the likelihood of exploitation by opportunistic attackers or automated scanning tools. The absence of known exploits currently limits immediate widespread impact but also means defenders must proactively address the risk before exploitation becomes common. The impact extends beyond the device itself to the broader network security posture of affected organizations.
Mitigation Recommendations
1. Immediately isolate Linksys E1200 v2 routers running firmware E1200_v2.0.11.001_us from untrusted networks to prevent remote exploitation. 2. Monitor vendor communications closely for firmware updates or patches addressing CVE-2025-60689 and apply them promptly once available. 3. Restrict access to the router’s HTTP management interface using network segmentation, firewall rules, or VPNs to limit exposure to trusted administrators only. 4. Disable remote management features if not strictly necessary, especially HTTP-based management interfaces. 5. Implement network-level intrusion detection or prevention systems to detect anomalous command injection attempts targeting router CGI parameters. 6. Conduct network audits to identify all instances of Linksys E1200 v2 routers and verify firmware versions to prioritize remediation efforts. 7. Consider replacing vulnerable devices with newer, supported hardware if patches are delayed or unavailable. 8. Educate IT staff on recognizing signs of router compromise, such as unexpected configuration changes or unusual network traffic patterns. 9. Employ strong network segmentation to limit lateral movement if a router is compromised. 10. Maintain regular backups of router configurations to enable rapid recovery after remediation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-60689: n/a
Description
An unauthenticated command injection vulnerability exists in the Start_EPI function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The vulnerability occurs because user-supplied CGI parameters (wl_ant, wl_ssid, wl_rate, ttcp_num, ttcp_ip, ttcp_size) are concatenated into system command strings without proper sanitization and executed via wl_exec_cmd. Successful exploitation allows remote attackers to execute arbitrary commands on the device without authentication.
AI-Powered Analysis
Technical Analysis
CVE-2025-60689 is a critical security vulnerability identified in the Linksys E1200 version 2 routers, specifically in the Start_EPI function of the httpd binary within the firmware version E1200_v2.0.11.001_us. The vulnerability is a classic command injection flaw caused by improper input sanitization of CGI parameters (wl_ant, wl_ssid, wl_rate, ttcp_num, ttcp_ip, ttcp_size). These parameters are concatenated directly into system command strings executed via the wl_exec_cmd function without validation or escaping, enabling an attacker to inject arbitrary shell commands. Because the vulnerability is unauthenticated, any remote attacker with network access to the device’s HTTP interface can exploit it without credentials or user interaction. Successful exploitation allows full arbitrary command execution on the router, potentially leading to device takeover, network reconnaissance, lateral movement, or persistent backdoors. The firmware version affected is specifically E1200_v2.0.11.001_us, indicating a narrow but critical attack surface. No CVSS score has been assigned yet, and no public exploits are currently reported. The vulnerability was reserved in late September 2025 and published in November 2025, indicating recent discovery. The lack of patches or mitigation details suggests that vendors and users must act cautiously and monitor for updates. Given the router’s role as a network gateway device, compromise could impact confidentiality, integrity, and availability of connected networks and devices.
Potential Impact
For European organizations, the impact of CVE-2025-60689 can be severe. Linksys E1200 v2 routers are commonly used in small to medium business and home office environments, which are often less rigorously secured than enterprise-grade infrastructure. Exploitation could allow attackers to gain persistent control over the network gateway, enabling interception or manipulation of network traffic, deployment of malware, or pivoting into internal networks. This could lead to data breaches, disruption of business operations, or use of compromised routers as part of larger botnets or attack campaigns. Critical infrastructure sectors relying on these routers for remote sites or branch offices may face operational disruptions or espionage risks. The unauthenticated nature of the vulnerability increases the likelihood of exploitation by opportunistic attackers or automated scanning tools. The absence of known exploits currently limits immediate widespread impact but also means defenders must proactively address the risk before exploitation becomes common. The impact extends beyond the device itself to the broader network security posture of affected organizations.
Mitigation Recommendations
1. Immediately isolate Linksys E1200 v2 routers running firmware E1200_v2.0.11.001_us from untrusted networks to prevent remote exploitation. 2. Monitor vendor communications closely for firmware updates or patches addressing CVE-2025-60689 and apply them promptly once available. 3. Restrict access to the router’s HTTP management interface using network segmentation, firewall rules, or VPNs to limit exposure to trusted administrators only. 4. Disable remote management features if not strictly necessary, especially HTTP-based management interfaces. 5. Implement network-level intrusion detection or prevention systems to detect anomalous command injection attempts targeting router CGI parameters. 6. Conduct network audits to identify all instances of Linksys E1200 v2 routers and verify firmware versions to prioritize remediation efforts. 7. Consider replacing vulnerable devices with newer, supported hardware if patches are delayed or unavailable. 8. Educate IT staff on recognizing signs of router compromise, such as unexpected configuration changes or unusual network traffic patterns. 9. Employ strong network segmentation to limit lateral movement if a router is compromised. 10. Maintain regular backups of router configurations to enable rapid recovery after remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69160e4773934fe85f031b0d
Added to database: 11/13/2025, 4:58:47 PM
Last enriched: 11/13/2025, 4:59:01 PM
Last updated: 11/15/2025, 6:36:10 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13189: Stack-based Buffer Overflow in D-Link DIR-816L
HighCVE-2025-8994: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wedevs Project Management & Task Manager with Kanban Board & Gantt Chart – WP Project Manager
MediumCVE-2025-12847: CWE-862 Missing Authorization in smub All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic
MediumCVE-2025-12494: CWE-285 Improper Authorization in wpchill Image Gallery – Photo Grid & Video Gallery
MediumCVE-2025-65072
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.