Skip to main content

CVE-2025-8821: OS Command Injection in Linksys RE6250

Medium
VulnerabilityCVE-2025-8821cvecve-2025-8821
Published: Mon Aug 11 2025 (08/11/2025, 00:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6250

Description

A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This issue affects the function RP_setBasic of the file /goform/RP_setBasic. The manipulation of the argument bssid leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/18/2025, 01:07:49 UTC

Technical Analysis

CVE-2025-8821 is a security vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically firmware versions up to 20250801. The vulnerability resides in the RP_setBasic function within the /goform/RP_setBasic endpoint. It arises from improper sanitization of the 'bssid' parameter, which can be manipulated to perform OS command injection. This means an attacker can remotely execute arbitrary operating system commands on the affected device without requiring user interaction or authentication. The vulnerability is remotely exploitable over the network, increasing its risk profile. Although the vendor was notified early, no response or patch has been issued as of the publication date (August 11, 2025). The CVSS v4.0 base score is 5.3 (medium severity), reflecting the ease of exploitation (network vector, no authentication), but limited impact on confidentiality, integrity, and availability (low to limited impact). No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the likelihood of future attacks. The absence of vendor patches leaves devices vulnerable to compromise, potentially allowing attackers to gain control over the device, manipulate network traffic, or use the device as a foothold for further attacks within the network environment.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, especially for those using affected Linksys range extenders in their network infrastructure. Compromise of these devices could lead to unauthorized command execution, enabling attackers to alter device configurations, intercept or redirect network traffic, or pivot to other internal systems. This could result in data breaches, disruption of network services, or establishment of persistent access. Small and medium enterprises (SMEs) and home office setups that rely on these consumer-grade devices may be particularly vulnerable due to less rigorous network segmentation and monitoring. Additionally, sectors with high reliance on secure network communications, such as finance, healthcare, and critical infrastructure, could face increased risks if these devices are deployed within their environments. The lack of vendor response and patches exacerbates the threat, as organizations must rely on mitigations rather than fixes. Given the remote exploitability without authentication or user interaction, attackers can target these devices en masse, potentially leading to widespread compromise across European networks.

Mitigation Recommendations

Organizations should immediately inventory their network to identify the presence of affected Linksys range extender models and firmware versions. Until a vendor patch is available, it is critical to isolate these devices from sensitive network segments and restrict their management interfaces to trusted IP addresses only. Employ network-level access controls such as firewall rules to block external access to the /goform/RP_setBasic endpoint. Monitoring network traffic for unusual patterns or command injection attempts targeting these devices can provide early detection. Where feasible, replace vulnerable devices with alternative hardware from vendors with active security support. Additionally, implement network segmentation to limit the potential lateral movement from compromised devices. Regularly review and update device firmware once the vendor releases a patch. Finally, educate users and administrators about the risks associated with these devices and the importance of timely updates and network hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-10T07:53:42.812Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68993da9ad5a09ad001d42a9

Added to database: 8/11/2025, 12:47:37 AM

Last enriched: 8/18/2025, 1:07:49 AM

Last updated: 9/21/2025, 9:58:52 AM

Views: 31

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats