CVE-2025-8821: OS Command Injection in Linksys RE6250
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This issue affects the function RP_setBasic of the file /goform/RP_setBasic. The manipulation of the argument bssid leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8821 is a security vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically firmware versions up to 20250801. The vulnerability resides in the RP_setBasic function within the /goform/RP_setBasic endpoint. It arises from improper sanitization of the 'bssid' parameter, which can be manipulated to perform OS command injection. This means an attacker can remotely execute arbitrary operating system commands on the affected device without requiring user interaction or authentication. The vulnerability is remotely exploitable over the network, increasing its risk profile. Although the vendor was notified early, no response or patch has been issued as of the publication date (August 11, 2025). The CVSS v4.0 base score is 5.3 (medium severity), reflecting the ease of exploitation (network vector, no authentication), but limited impact on confidentiality, integrity, and availability (low to limited impact). No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the likelihood of future attacks. The absence of vendor patches leaves devices vulnerable to compromise, potentially allowing attackers to gain control over the device, manipulate network traffic, or use the device as a foothold for further attacks within the network environment.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those using affected Linksys range extenders in their network infrastructure. Compromise of these devices could lead to unauthorized command execution, enabling attackers to alter device configurations, intercept or redirect network traffic, or pivot to other internal systems. This could result in data breaches, disruption of network services, or establishment of persistent access. Small and medium enterprises (SMEs) and home office setups that rely on these consumer-grade devices may be particularly vulnerable due to less rigorous network segmentation and monitoring. Additionally, sectors with high reliance on secure network communications, such as finance, healthcare, and critical infrastructure, could face increased risks if these devices are deployed within their environments. The lack of vendor response and patches exacerbates the threat, as organizations must rely on mitigations rather than fixes. Given the remote exploitability without authentication or user interaction, attackers can target these devices en masse, potentially leading to widespread compromise across European networks.
Mitigation Recommendations
Organizations should immediately inventory their network to identify the presence of affected Linksys range extender models and firmware versions. Until a vendor patch is available, it is critical to isolate these devices from sensitive network segments and restrict their management interfaces to trusted IP addresses only. Employ network-level access controls such as firewall rules to block external access to the /goform/RP_setBasic endpoint. Monitoring network traffic for unusual patterns or command injection attempts targeting these devices can provide early detection. Where feasible, replace vulnerable devices with alternative hardware from vendors with active security support. Additionally, implement network segmentation to limit the potential lateral movement from compromised devices. Regularly review and update device firmware once the vendor releases a patch. Finally, educate users and administrators about the risks associated with these devices and the importance of timely updates and network hygiene.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-8821: OS Command Injection in Linksys RE6250
Description
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This issue affects the function RP_setBasic of the file /goform/RP_setBasic. The manipulation of the argument bssid leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8821 is a security vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically firmware versions up to 20250801. The vulnerability resides in the RP_setBasic function within the /goform/RP_setBasic endpoint. It arises from improper sanitization of the 'bssid' parameter, which can be manipulated to perform OS command injection. This means an attacker can remotely execute arbitrary operating system commands on the affected device without requiring user interaction or authentication. The vulnerability is remotely exploitable over the network, increasing its risk profile. Although the vendor was notified early, no response or patch has been issued as of the publication date (August 11, 2025). The CVSS v4.0 base score is 5.3 (medium severity), reflecting the ease of exploitation (network vector, no authentication), but limited impact on confidentiality, integrity, and availability (low to limited impact). No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the likelihood of future attacks. The absence of vendor patches leaves devices vulnerable to compromise, potentially allowing attackers to gain control over the device, manipulate network traffic, or use the device as a foothold for further attacks within the network environment.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those using affected Linksys range extenders in their network infrastructure. Compromise of these devices could lead to unauthorized command execution, enabling attackers to alter device configurations, intercept or redirect network traffic, or pivot to other internal systems. This could result in data breaches, disruption of network services, or establishment of persistent access. Small and medium enterprises (SMEs) and home office setups that rely on these consumer-grade devices may be particularly vulnerable due to less rigorous network segmentation and monitoring. Additionally, sectors with high reliance on secure network communications, such as finance, healthcare, and critical infrastructure, could face increased risks if these devices are deployed within their environments. The lack of vendor response and patches exacerbates the threat, as organizations must rely on mitigations rather than fixes. Given the remote exploitability without authentication or user interaction, attackers can target these devices en masse, potentially leading to widespread compromise across European networks.
Mitigation Recommendations
Organizations should immediately inventory their network to identify the presence of affected Linksys range extender models and firmware versions. Until a vendor patch is available, it is critical to isolate these devices from sensitive network segments and restrict their management interfaces to trusted IP addresses only. Employ network-level access controls such as firewall rules to block external access to the /goform/RP_setBasic endpoint. Monitoring network traffic for unusual patterns or command injection attempts targeting these devices can provide early detection. Where feasible, replace vulnerable devices with alternative hardware from vendors with active security support. Additionally, implement network segmentation to limit the potential lateral movement from compromised devices. Regularly review and update device firmware once the vendor releases a patch. Finally, educate users and administrators about the risks associated with these devices and the importance of timely updates and network hygiene.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-10T07:53:42.812Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68993da9ad5a09ad001d42a9
Added to database: 8/11/2025, 12:47:37 AM
Last enriched: 8/18/2025, 1:07:49 AM
Last updated: 9/21/2025, 9:58:52 AM
Views: 31
Related Threats
CVE-2025-58915: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Emarket-design YouTube Showcase
MediumCVE-2025-42907: CWE-918: Server-Side Request Forgery in SAP_SE SAP BI Platform
MediumCVE-2025-10832: SQL Injection in SourceCodester Pet Grooming Management Software
MediumCVE-2025-9495: CWE-602 Client-Side Enforcement of Server-Side Security in Viessmann Vitogate 300
HighCVE-2025-9494: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Viessmann Vitogate 300
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.