CVE-2025-9244: OS Command Injection in Linksys RE6250
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function addStaticRoute of the file /goform/addStaticRoute. Such manipulation of the argument staticRoute_IP_setting/staticRoute_Netmask_setting/staticRoute_Gateway_setting/staticRoute_Metric_setting/staticRoute_destType_setting leads to os command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9244 is a security vulnerability identified in multiple versions of Linksys range extender devices, specifically models RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 running firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability exists in the addStaticRoute function within the /goform/addStaticRoute endpoint. This function processes parameters related to static routing configuration, including staticRoute_IP_setting, staticRoute_Netmask_setting, staticRoute_Gateway_setting, staticRoute_Metric_setting, and staticRoute_destType_setting. Improper input validation or sanitization of these parameters allows an attacker to inject arbitrary operating system commands. The vulnerability is exploitable remotely without authentication or user interaction, as the affected endpoint is accessible over the network. The vendor was notified but has not issued any response or patch at the time of disclosure. The CVSS v4.0 base score is 5.3, indicating a medium severity level. The vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation attempts. The vulnerability could allow attackers to execute arbitrary commands on the device, potentially leading to device compromise, network reconnaissance, or pivoting to other internal systems.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those relying on Linksys range extenders in their network infrastructure. Compromise of these devices could lead to unauthorized command execution, enabling attackers to manipulate network routing, intercept or redirect traffic, or establish persistent footholds within corporate networks. This could degrade network availability or confidentiality and facilitate further attacks against internal resources. Small and medium enterprises or branch offices using these consumer-grade devices without strict network segmentation are particularly vulnerable. Additionally, critical infrastructure or organizations with remote sites using these extenders could face increased risk of lateral movement by attackers. The lack of vendor response and patches exacerbates the threat, as organizations must rely on mitigation or device replacement. Given the medium CVSS score and the ease of remote exploitation without authentication, the threat should be taken seriously in environments where these devices are deployed.
Mitigation Recommendations
1. Immediate network-level mitigation: Block external and untrusted network access to the management interface of Linksys RE series devices, especially the /goform/addStaticRoute endpoint, using firewall rules or network segmentation. 2. Disable remote management features on affected devices if not strictly necessary. 3. Replace affected devices with updated hardware from vendors with active security support if possible. 4. Monitor network traffic for unusual requests targeting the addStaticRoute endpoint or suspicious command execution patterns. 5. Implement strict access controls and isolate vulnerable devices on separate VLANs to limit potential lateral movement. 6. Regularly audit and inventory network devices to identify vulnerable Linksys models and firmware versions. 7. If device replacement is not immediately feasible, consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block command injection attempts targeting these devices. 8. Stay alert for vendor updates or community patches and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-9244: OS Command Injection in Linksys RE6250
Description
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function addStaticRoute of the file /goform/addStaticRoute. Such manipulation of the argument staticRoute_IP_setting/staticRoute_Netmask_setting/staticRoute_Gateway_setting/staticRoute_Metric_setting/staticRoute_destType_setting leads to os command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9244 is a security vulnerability identified in multiple versions of Linksys range extender devices, specifically models RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 running firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability exists in the addStaticRoute function within the /goform/addStaticRoute endpoint. This function processes parameters related to static routing configuration, including staticRoute_IP_setting, staticRoute_Netmask_setting, staticRoute_Gateway_setting, staticRoute_Metric_setting, and staticRoute_destType_setting. Improper input validation or sanitization of these parameters allows an attacker to inject arbitrary operating system commands. The vulnerability is exploitable remotely without authentication or user interaction, as the affected endpoint is accessible over the network. The vendor was notified but has not issued any response or patch at the time of disclosure. The CVSS v4.0 base score is 5.3, indicating a medium severity level. The vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation attempts. The vulnerability could allow attackers to execute arbitrary commands on the device, potentially leading to device compromise, network reconnaissance, or pivoting to other internal systems.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those relying on Linksys range extenders in their network infrastructure. Compromise of these devices could lead to unauthorized command execution, enabling attackers to manipulate network routing, intercept or redirect traffic, or establish persistent footholds within corporate networks. This could degrade network availability or confidentiality and facilitate further attacks against internal resources. Small and medium enterprises or branch offices using these consumer-grade devices without strict network segmentation are particularly vulnerable. Additionally, critical infrastructure or organizations with remote sites using these extenders could face increased risk of lateral movement by attackers. The lack of vendor response and patches exacerbates the threat, as organizations must rely on mitigation or device replacement. Given the medium CVSS score and the ease of remote exploitation without authentication, the threat should be taken seriously in environments where these devices are deployed.
Mitigation Recommendations
1. Immediate network-level mitigation: Block external and untrusted network access to the management interface of Linksys RE series devices, especially the /goform/addStaticRoute endpoint, using firewall rules or network segmentation. 2. Disable remote management features on affected devices if not strictly necessary. 3. Replace affected devices with updated hardware from vendors with active security support if possible. 4. Monitor network traffic for unusual requests targeting the addStaticRoute endpoint or suspicious command execution patterns. 5. Implement strict access controls and isolate vulnerable devices on separate VLANs to limit potential lateral movement. 6. Regularly audit and inventory network devices to identify vulnerable Linksys models and firmware versions. 7. If device replacement is not immediately feasible, consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block command injection attempts targeting these devices. 8. Stay alert for vendor updates or community patches and apply them promptly once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-20T11:16:31.303Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a6267aad5a09ad00085260
Added to database: 8/20/2025, 7:48:10 PM
Last enriched: 8/20/2025, 8:02:46 PM
Last updated: 8/21/2025, 12:35:14 AM
Views: 3
Related Threats
CVE-2025-43300: Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. in Apple macOS
UnknownCVE-2025-57748
LowCVE-2025-57747
LowCVE-2025-57746
LowCVE-2025-57745
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.