CVE-2025-8825: OS Command Injection in Linksys RE6250
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This affects the function RP_setBasicAuto of the file /goform/RP_setBasicAuto. The manipulation of the argument staticIp/staticNetmask leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8825 is a security vulnerability affecting multiple Linksys range extender models including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 with firmware versions up to 20250801. The vulnerability exists in the RP_setBasicAuto function within the /goform/RP_setBasicAuto endpoint. Specifically, the issue arises from improper sanitization of the staticIp and staticNetmask parameters, which are used in OS command execution. An attacker can remotely manipulate these parameters to perform OS command injection, allowing arbitrary command execution on the device with the privileges of the affected service. This vulnerability does not require user interaction or authentication, making it remotely exploitable over the network. The vendor, Linksys, was notified early but has not responded or provided a patch at the time of disclosure. The CVSS v4.0 base score is 5.3 (medium severity), reflecting a network attack vector with low complexity, no privileges required, and no user interaction, but limited impact on confidentiality, integrity, and availability. Although no known exploits have been observed in the wild yet, the public disclosure of the exploit code increases the risk of exploitation. This vulnerability could allow attackers to compromise the device, potentially pivot into internal networks, intercept or manipulate traffic, or disrupt network connectivity.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for enterprises and service providers using Linksys range extenders in their network infrastructure. Successful exploitation could lead to unauthorized control over network devices, enabling attackers to intercept sensitive communications, launch further attacks within the internal network, or cause denial of service by disrupting network connectivity. Given the widespread use of Linksys products in small and medium-sized businesses and home office environments across Europe, the vulnerability could be leveraged to target less hardened network segments. Critical infrastructure operators or organizations with remote sites relying on these extenders may face increased exposure. The lack of vendor response and patches increases the window of opportunity for attackers. Additionally, the remote and unauthenticated nature of the exploit makes it accessible to a broad range of threat actors, including opportunistic attackers and automated scanning tools. However, the medium severity score indicates that while impactful, the vulnerability may not lead to full network compromise without additional factors.
Mitigation Recommendations
Organizations should immediately inventory their network to identify the presence of affected Linksys range extender models and firmware versions. Until a vendor patch is available, network segmentation should be enforced to isolate vulnerable devices from critical systems and sensitive data. Access to the management interfaces of these devices should be restricted via firewall rules, VPNs, or network access control lists to trusted administrators only. Monitoring network traffic for unusual commands or connections to the /goform/RP_setBasicAuto endpoint can help detect exploitation attempts. Where possible, disable remote management features or change default credentials to reduce exposure. Consider replacing vulnerable devices with alternative hardware from vendors with active security support if patching is not forthcoming. Regularly check for vendor updates or security advisories. Implementing intrusion detection systems with signatures for this vulnerability can provide early warning. Finally, educate IT staff about the risks and signs of exploitation related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-8825: OS Command Injection in Linksys RE6250
Description
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This affects the function RP_setBasicAuto of the file /goform/RP_setBasicAuto. The manipulation of the argument staticIp/staticNetmask leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8825 is a security vulnerability affecting multiple Linksys range extender models including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 with firmware versions up to 20250801. The vulnerability exists in the RP_setBasicAuto function within the /goform/RP_setBasicAuto endpoint. Specifically, the issue arises from improper sanitization of the staticIp and staticNetmask parameters, which are used in OS command execution. An attacker can remotely manipulate these parameters to perform OS command injection, allowing arbitrary command execution on the device with the privileges of the affected service. This vulnerability does not require user interaction or authentication, making it remotely exploitable over the network. The vendor, Linksys, was notified early but has not responded or provided a patch at the time of disclosure. The CVSS v4.0 base score is 5.3 (medium severity), reflecting a network attack vector with low complexity, no privileges required, and no user interaction, but limited impact on confidentiality, integrity, and availability. Although no known exploits have been observed in the wild yet, the public disclosure of the exploit code increases the risk of exploitation. This vulnerability could allow attackers to compromise the device, potentially pivot into internal networks, intercept or manipulate traffic, or disrupt network connectivity.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for enterprises and service providers using Linksys range extenders in their network infrastructure. Successful exploitation could lead to unauthorized control over network devices, enabling attackers to intercept sensitive communications, launch further attacks within the internal network, or cause denial of service by disrupting network connectivity. Given the widespread use of Linksys products in small and medium-sized businesses and home office environments across Europe, the vulnerability could be leveraged to target less hardened network segments. Critical infrastructure operators or organizations with remote sites relying on these extenders may face increased exposure. The lack of vendor response and patches increases the window of opportunity for attackers. Additionally, the remote and unauthenticated nature of the exploit makes it accessible to a broad range of threat actors, including opportunistic attackers and automated scanning tools. However, the medium severity score indicates that while impactful, the vulnerability may not lead to full network compromise without additional factors.
Mitigation Recommendations
Organizations should immediately inventory their network to identify the presence of affected Linksys range extender models and firmware versions. Until a vendor patch is available, network segmentation should be enforced to isolate vulnerable devices from critical systems and sensitive data. Access to the management interfaces of these devices should be restricted via firewall rules, VPNs, or network access control lists to trusted administrators only. Monitoring network traffic for unusual commands or connections to the /goform/RP_setBasicAuto endpoint can help detect exploitation attempts. Where possible, disable remote management features or change default credentials to reduce exposure. Consider replacing vulnerable devices with alternative hardware from vendors with active security support if patching is not forthcoming. Regularly check for vendor updates or security advisories. Implementing intrusion detection systems with signatures for this vulnerability can provide early warning. Finally, educate IT staff about the risks and signs of exploitation related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-10T07:53:53.892Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689959c9ad5a09ad001ff2aa
Added to database: 8/11/2025, 2:47:37 AM
Last enriched: 8/19/2025, 1:45:25 AM
Last updated: 9/23/2025, 11:56:29 AM
Views: 32
Related Threats
CVE-2025-29156: n/a
HighCVE-2025-29157: n/a
MediumCVE-2025-10962: Command Injection in Wavlink NU516U1
MediumCVE-2025-10961: Command Injection in Wavlink NU516U1
MediumCVE-2025-10960: Command Injection in Wavlink NU516U1
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.