Skip to main content

CVE-2025-8828: OS Command Injection in Linksys RE6250

Medium
VulnerabilityCVE-2025-8828cvecve-2025-8828
Published: Mon Aug 11 2025 (08/11/2025, 03:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6250

Description

A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function ipv6cmd of the file /goform/setIpv6. The manipulation of the argument Ipv6PriDns/Ipv6SecDns/Ipv6StaticGateway/LanIpv6Addr/LanPrefixLen/pppoeUser/pppoePass/pppoeIdleTime/pppoeRedialPeriod/Ipv6in4_PrefixLen/LocalIpv6/RemoteIpv4/LanIPv6_Prefix/LanPrefixLen/ipv6to4Relay/ipv6rdRelay/tunrd_PrefixLen/wan_UseLinkLocal/Ipv6StaticIp/Ipv6PrefixLen leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/19/2025, 01:46:25 UTC

Technical Analysis

CVE-2025-8828 is a medium-severity OS command injection vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 with firmware versions up to 20250801. The vulnerability resides in the ipv6cmd function within the /goform/setIpv6 endpoint. Specifically, the flaw arises from improper sanitization of several IPv6-related parameters such as Ipv6PriDns, Ipv6SecDns, Ipv6StaticGateway, LanIpv6Addr, LanPrefixLen, pppoeUser, pppoePass, pppoeIdleTime, pppoeRedialPeriod, Ipv6in4_PrefixLen, LocalIpv6, RemoteIpv4, LanIPv6_Prefix, ipv6to4Relay, ipv6rdRelay, tunrd_PrefixLen, wan_UseLinkLocal, Ipv6StaticIp, and Ipv6PrefixLen. An attacker can remotely send crafted requests to this endpoint, injecting arbitrary OS commands that the device executes with elevated privileges. This can lead to unauthorized command execution on the device, potentially allowing attackers to manipulate device configurations, pivot into internal networks, or disrupt network availability. The vulnerability does not require user interaction or authentication, increasing its risk profile. Although the vendor was notified early, no response or patch has been provided, and public exploit details have been disclosed, increasing the likelihood of exploitation. The CVSS 4.0 base score is 5.3, reflecting a medium severity with network attack vector, low complexity, no authentication required, and partial impacts on confidentiality, integrity, and availability.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and SMEs relying on Linksys range extenders to enhance wireless network coverage. Successful exploitation could lead to unauthorized control over network devices, enabling attackers to intercept or manipulate network traffic, disrupt connectivity, or use the compromised device as a foothold for lateral movement within corporate networks. This is particularly concerning for organizations with sensitive data or critical infrastructure relying on stable and secure network environments. The lack of vendor response and patch availability increases exposure time. Additionally, the vulnerability's focus on IPv6 parameters is notable as IPv6 adoption is growing in Europe, potentially increasing the attack surface. The ability to exploit remotely without authentication means attackers can target vulnerable devices over the internet or internal networks, raising the risk of widespread compromise.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. First, isolate affected Linksys devices from direct internet exposure by placing them behind firewalls or network segmentation to restrict access to the /goform/setIpv6 endpoint. Disable IPv6 functionality on these devices if not required, reducing the attack surface related to the vulnerable parameters. Monitor network traffic for unusual requests targeting the vulnerable endpoint or suspicious command execution patterns. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts. Where feasible, replace vulnerable Linksys extenders with devices from vendors providing timely security updates. For organizations with in-house firmware expertise, consider applying custom firmware or configuration hardening to sanitize inputs or disable vulnerable services. Maintain strict network access controls and regularly audit device configurations. Finally, maintain heightened awareness for related threat intelligence updates and be prepared to apply vendor patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-10T07:54:01.680Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68996b5dad5a09ad00207610

Added to database: 8/11/2025, 4:02:37 AM

Last enriched: 8/19/2025, 1:46:25 AM

Last updated: 9/16/2025, 1:46:58 AM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats