Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60694: n/a

0
High
VulnerabilityCVE-2025-60694cvecve-2025-60694
Published: Thu Nov 13 2025 (11/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A stack-based buffer overflow exists in the validate_static_route function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function improperly concatenates user-supplied CGI parameters (route_ipaddr_0~3, route_netmask_0~3, route_gateway_0~3) into fixed-size buffers (v6, v10, v14) without proper bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication.

AI-Powered Analysis

AILast updated: 11/13/2025, 17:21:51 UTC

Technical Analysis

CVE-2025-60694 is a critical stack-based buffer overflow vulnerability identified in the validate_static_route function within the httpd binary of Linksys E1200 v2 routers, specifically in firmware version E1200_v2.0.11.001_us. The vulnerability stems from the improper handling of user-supplied CGI parameters related to static routing configuration (route_ipaddr_0~3, route_netmask_0~3, route_gateway_0~3). These parameters are concatenated into fixed-size buffers (v6, v10, v14) without adequate bounds checking, leading to a classic buffer overflow condition on the stack. This flaw allows remote attackers to send specially crafted HTTP requests to the router's web management interface, triggering arbitrary code execution or causing a denial of service. Notably, exploitation does not require authentication or user interaction, making it highly accessible to attackers scanning for vulnerable devices. The httpd binary is responsible for handling HTTP requests on the router, and compromising it can lead to full device control, enabling attackers to manipulate network traffic, intercept data, or pivot into connected networks. Although no public exploits are currently known, the vulnerability’s characteristics make it a prime candidate for future exploitation. The affected device, Linksys E1200 v2, is a popular consumer-grade router used in many home and small office environments, which often lack robust security controls, increasing exposure risk. The absence of a CVSS score necessitates an expert severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, especially small businesses and home offices using Linksys E1200 v2 routers, this vulnerability poses significant risks. Successful exploitation can lead to remote code execution, allowing attackers to fully compromise the router, intercept or manipulate network traffic, and potentially access internal networks. This threatens confidentiality by exposing sensitive data, integrity by enabling traffic manipulation or injection, and availability through denial of service attacks. The lack of authentication requirements means attackers can exploit the vulnerability remotely without prior access, increasing the attack surface. Disruption of network connectivity can impact business operations, and compromised routers can serve as footholds for further attacks within corporate or residential networks. Given the widespread use of consumer routers in European homes and small offices, the vulnerability could facilitate large-scale botnet recruitment or targeted espionage campaigns. The impact is particularly severe for organizations lacking network segmentation or advanced monitoring, as the router compromise may go undetected for extended periods.

Mitigation Recommendations

Immediate mitigation requires Linksys to release a firmware update addressing the buffer overflow by implementing proper bounds checking in the validate_static_route function. Until a patch is available, organizations should restrict access to the router’s web management interface by disabling remote management and limiting local network access. Network administrators should deploy firewall rules or intrusion prevention systems to block or monitor suspicious HTTP requests targeting the router’s CGI endpoints. Employing network segmentation to isolate vulnerable devices from critical assets reduces potential damage. Regularly auditing router firmware versions and configurations can help identify affected devices. Users should change default credentials and disable unnecessary services to reduce attack vectors. Additionally, monitoring network traffic for anomalies indicative of exploitation attempts can provide early warning. Organizations should educate users about the risks of outdated firmware and encourage timely updates. Finally, consider replacing end-of-life or unsupported devices with models that receive regular security updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6916102073934fe85f046f5d

Added to database: 11/13/2025, 5:06:40 PM

Last enriched: 11/13/2025, 5:21:51 PM

Last updated: 11/14/2025, 4:10:36 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats