CVE-2025-8828: OS Command Injection in Linksys RE6250
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function ipv6cmd of the file /goform/setIpv6. The manipulation of the argument Ipv6PriDns/Ipv6SecDns/Ipv6StaticGateway/LanIpv6Addr/LanPrefixLen/pppoeUser/pppoePass/pppoeIdleTime/pppoeRedialPeriod/Ipv6in4_PrefixLen/LocalIpv6/RemoteIpv4/LanIPv6_Prefix/LanPrefixLen/ipv6to4Relay/ipv6rdRelay/tunrd_PrefixLen/wan_UseLinkLocal/Ipv6StaticIp/Ipv6PrefixLen leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8828 is a medium-severity OS command injection vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 with firmware versions up to 20250801. The vulnerability resides in the ipv6cmd function within the /goform/setIpv6 endpoint. Specifically, the flaw arises from improper sanitization of several IPv6-related parameters such as Ipv6PriDns, Ipv6SecDns, Ipv6StaticGateway, LanIpv6Addr, LanPrefixLen, pppoeUser, pppoePass, pppoeIdleTime, pppoeRedialPeriod, Ipv6in4_PrefixLen, LocalIpv6, RemoteIpv4, LanIPv6_Prefix, ipv6to4Relay, ipv6rdRelay, tunrd_PrefixLen, wan_UseLinkLocal, Ipv6StaticIp, and Ipv6PrefixLen. An attacker can remotely send crafted requests to this endpoint, injecting arbitrary OS commands that the device executes with elevated privileges. This can lead to unauthorized command execution on the device, potentially allowing attackers to manipulate device configurations, pivot into internal networks, or disrupt network availability. The vulnerability does not require user interaction or authentication, increasing its risk profile. Although the vendor was notified early, no response or patch has been provided, and public exploit details have been disclosed, increasing the likelihood of exploitation. The CVSS 4.0 base score is 5.3, reflecting a medium severity with network attack vector, low complexity, no authentication required, and partial impacts on confidentiality, integrity, and availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises and SMEs relying on Linksys range extenders to enhance wireless network coverage. Successful exploitation could lead to unauthorized control over network devices, enabling attackers to intercept or manipulate network traffic, disrupt connectivity, or use the compromised device as a foothold for lateral movement within corporate networks. This is particularly concerning for organizations with sensitive data or critical infrastructure relying on stable and secure network environments. The lack of vendor response and patch availability increases exposure time. Additionally, the vulnerability's focus on IPv6 parameters is notable as IPv6 adoption is growing in Europe, potentially increasing the attack surface. The ability to exploit remotely without authentication means attackers can target vulnerable devices over the internet or internal networks, raising the risk of widespread compromise.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, isolate affected Linksys devices from direct internet exposure by placing them behind firewalls or network segmentation to restrict access to the /goform/setIpv6 endpoint. Disable IPv6 functionality on these devices if not required, reducing the attack surface related to the vulnerable parameters. Monitor network traffic for unusual requests targeting the vulnerable endpoint or suspicious command execution patterns. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts. Where feasible, replace vulnerable Linksys extenders with devices from vendors providing timely security updates. For organizations with in-house firmware expertise, consider applying custom firmware or configuration hardening to sanitize inputs or disable vulnerable services. Maintain strict network access controls and regularly audit device configurations. Finally, maintain heightened awareness for related threat intelligence updates and be prepared to apply vendor patches promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland
CVE-2025-8828: OS Command Injection in Linksys RE6250
Description
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function ipv6cmd of the file /goform/setIpv6. The manipulation of the argument Ipv6PriDns/Ipv6SecDns/Ipv6StaticGateway/LanIpv6Addr/LanPrefixLen/pppoeUser/pppoePass/pppoeIdleTime/pppoeRedialPeriod/Ipv6in4_PrefixLen/LocalIpv6/RemoteIpv4/LanIPv6_Prefix/LanPrefixLen/ipv6to4Relay/ipv6rdRelay/tunrd_PrefixLen/wan_UseLinkLocal/Ipv6StaticIp/Ipv6PrefixLen leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8828 is a medium-severity OS command injection vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 with firmware versions up to 20250801. The vulnerability resides in the ipv6cmd function within the /goform/setIpv6 endpoint. Specifically, the flaw arises from improper sanitization of several IPv6-related parameters such as Ipv6PriDns, Ipv6SecDns, Ipv6StaticGateway, LanIpv6Addr, LanPrefixLen, pppoeUser, pppoePass, pppoeIdleTime, pppoeRedialPeriod, Ipv6in4_PrefixLen, LocalIpv6, RemoteIpv4, LanIPv6_Prefix, ipv6to4Relay, ipv6rdRelay, tunrd_PrefixLen, wan_UseLinkLocal, Ipv6StaticIp, and Ipv6PrefixLen. An attacker can remotely send crafted requests to this endpoint, injecting arbitrary OS commands that the device executes with elevated privileges. This can lead to unauthorized command execution on the device, potentially allowing attackers to manipulate device configurations, pivot into internal networks, or disrupt network availability. The vulnerability does not require user interaction or authentication, increasing its risk profile. Although the vendor was notified early, no response or patch has been provided, and public exploit details have been disclosed, increasing the likelihood of exploitation. The CVSS 4.0 base score is 5.3, reflecting a medium severity with network attack vector, low complexity, no authentication required, and partial impacts on confidentiality, integrity, and availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises and SMEs relying on Linksys range extenders to enhance wireless network coverage. Successful exploitation could lead to unauthorized control over network devices, enabling attackers to intercept or manipulate network traffic, disrupt connectivity, or use the compromised device as a foothold for lateral movement within corporate networks. This is particularly concerning for organizations with sensitive data or critical infrastructure relying on stable and secure network environments. The lack of vendor response and patch availability increases exposure time. Additionally, the vulnerability's focus on IPv6 parameters is notable as IPv6 adoption is growing in Europe, potentially increasing the attack surface. The ability to exploit remotely without authentication means attackers can target vulnerable devices over the internet or internal networks, raising the risk of widespread compromise.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, isolate affected Linksys devices from direct internet exposure by placing them behind firewalls or network segmentation to restrict access to the /goform/setIpv6 endpoint. Disable IPv6 functionality on these devices if not required, reducing the attack surface related to the vulnerable parameters. Monitor network traffic for unusual requests targeting the vulnerable endpoint or suspicious command execution patterns. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts. Where feasible, replace vulnerable Linksys extenders with devices from vendors providing timely security updates. For organizations with in-house firmware expertise, consider applying custom firmware or configuration hardening to sanitize inputs or disable vulnerable services. Maintain strict network access controls and regularly audit device configurations. Finally, maintain heightened awareness for related threat intelligence updates and be prepared to apply vendor patches promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-10T07:54:01.680Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68996b5dad5a09ad00207610
Added to database: 8/11/2025, 4:02:37 AM
Last enriched: 8/19/2025, 1:46:25 AM
Last updated: 11/6/2025, 10:26:17 AM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack
MediumCVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumCVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.