CVE-2025-60690: n/a
A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to four user-supplied CGI parameters matching <parameter>_0~3 into a fixed-size buffer (a2) without bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication.
AI Analysis
Technical Summary
CVE-2025-60690 is a stack-based buffer overflow vulnerability identified in the get_merge_ipaddr function within the httpd binary of Linksys E1200 v2 routers, specifically in firmware version E1200_v2.0.11.001_us. The vulnerability stems from the function's handling of up to four CGI parameters named with suffixes _0 through _3, which are concatenated into a fixed-size buffer (referred to as a2) without performing bounds checking. This lack of validation allows an attacker to supply specially crafted HTTP requests containing oversized parameter values that overflow the buffer on the stack. Exploiting this overflow can lead to arbitrary code execution or denial of service (DoS) conditions remotely, without requiring any authentication or user interaction. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and unchanged scope (S:U). Although no public exploits or patches are currently available, the vulnerability poses a significant risk to affected devices. The httpd binary is a critical component responsible for handling HTTP requests on the router, making this vulnerability particularly dangerous as it can be triggered remotely via crafted HTTP requests. The firmware version affected is specific, but the lack of patch availability increases the urgency for mitigation.
Potential Impact
The impact of CVE-2025-60690 is substantial for organizations using Linksys E1200 v2 routers with the specified vulnerable firmware. Successful exploitation enables remote attackers to execute arbitrary code, potentially gaining full control over the router. This can lead to interception or manipulation of network traffic, unauthorized access to internal networks, and pivoting to other connected devices. Additionally, attackers can cause denial of service, disrupting network availability. Since the vulnerability requires no authentication or user interaction, it can be exploited by any attacker with network access to the router's HTTP interface, increasing the attack surface. Organizations relying on these routers for critical network infrastructure or home office connectivity face risks of data breaches, network compromise, and operational disruption. The absence of patches and known exploits in the wild suggests a window of opportunity for attackers to develop and deploy exploits, emphasizing the need for proactive defense measures.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the router's HTTP management interface to trusted networks only, ideally via firewall rules or network segmentation, to reduce exposure to potential attackers. 2. Disable remote management features on the affected routers if enabled, preventing external HTTP requests from reaching the vulnerable service. 3. Monitor network traffic for unusual HTTP requests targeting CGI parameters with suspicious patterns or lengths that could indicate exploitation attempts. 4. Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect and block exploit attempts targeting this vulnerability. 5. Regularly check for firmware updates or security advisories from Linksys and apply patches promptly once available. 6. Consider replacing affected devices with newer models that have updated firmware and improved security posture if patching is not feasible. 7. Educate network administrators about this vulnerability and encourage proactive network hygiene and monitoring practices. 8. Implement network-level access controls and VPNs to limit management interface exposure. 9. Conduct vulnerability scanning to identify devices running the vulnerable firmware version within the organization’s network.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, Brazil, India
CVE-2025-60690: n/a
Description
A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to four user-supplied CGI parameters matching <parameter>_0~3 into a fixed-size buffer (a2) without bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-60690 is a stack-based buffer overflow vulnerability identified in the get_merge_ipaddr function within the httpd binary of Linksys E1200 v2 routers, specifically in firmware version E1200_v2.0.11.001_us. The vulnerability stems from the function's handling of up to four CGI parameters named with suffixes _0 through _3, which are concatenated into a fixed-size buffer (referred to as a2) without performing bounds checking. This lack of validation allows an attacker to supply specially crafted HTTP requests containing oversized parameter values that overflow the buffer on the stack. Exploiting this overflow can lead to arbitrary code execution or denial of service (DoS) conditions remotely, without requiring any authentication or user interaction. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and unchanged scope (S:U). Although no public exploits or patches are currently available, the vulnerability poses a significant risk to affected devices. The httpd binary is a critical component responsible for handling HTTP requests on the router, making this vulnerability particularly dangerous as it can be triggered remotely via crafted HTTP requests. The firmware version affected is specific, but the lack of patch availability increases the urgency for mitigation.
Potential Impact
The impact of CVE-2025-60690 is substantial for organizations using Linksys E1200 v2 routers with the specified vulnerable firmware. Successful exploitation enables remote attackers to execute arbitrary code, potentially gaining full control over the router. This can lead to interception or manipulation of network traffic, unauthorized access to internal networks, and pivoting to other connected devices. Additionally, attackers can cause denial of service, disrupting network availability. Since the vulnerability requires no authentication or user interaction, it can be exploited by any attacker with network access to the router's HTTP interface, increasing the attack surface. Organizations relying on these routers for critical network infrastructure or home office connectivity face risks of data breaches, network compromise, and operational disruption. The absence of patches and known exploits in the wild suggests a window of opportunity for attackers to develop and deploy exploits, emphasizing the need for proactive defense measures.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the router's HTTP management interface to trusted networks only, ideally via firewall rules or network segmentation, to reduce exposure to potential attackers. 2. Disable remote management features on the affected routers if enabled, preventing external HTTP requests from reaching the vulnerable service. 3. Monitor network traffic for unusual HTTP requests targeting CGI parameters with suspicious patterns or lengths that could indicate exploitation attempts. 4. Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect and block exploit attempts targeting this vulnerability. 5. Regularly check for firmware updates or security advisories from Linksys and apply patches promptly once available. 6. Consider replacing affected devices with newer models that have updated firmware and improved security posture if patching is not feasible. 7. Educate network administrators about this vulnerability and encourage proactive network hygiene and monitoring practices. 8. Implement network-level access controls and VPNs to limit management interface exposure. 9. Conduct vulnerability scanning to identify devices running the vulnerable firmware version within the organization’s network.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6916072eeb29b6dceb0d3f67
Added to database: 11/13/2025, 4:28:30 PM
Last enriched: 3/17/2026, 6:17:39 PM
Last updated: 3/23/2026, 9:49:29 PM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.