CVE-2025-9575: OS Command Injection in Linksys RE6250
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function cgiMain of the file /cgi-bin/upload.cgi. Executing manipulation of the argument filename can lead to os command injection. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9575 is a medium-severity OS command injection vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the cgiMain function of the /cgi-bin/upload.cgi script, where improper sanitization of the 'filename' argument allows an attacker to inject arbitrary OS commands. This flaw can be exploited remotely without user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L), reflecting partial but significant control over the device. Although the vendor was notified early, no response or patch has been issued, and no known exploits are currently observed in the wild. The vulnerability's exploitation could allow attackers to execute arbitrary commands on affected devices, potentially leading to device compromise, network pivoting, or disruption of network services. Given the nature of the devices as network extenders, successful exploitation could undermine network security and availability for connected users.
Potential Impact
For European organizations, this vulnerability poses a tangible risk to network infrastructure security. Linksys range extenders are commonly used in small to medium enterprises and home office environments to extend Wi-Fi coverage. Exploitation could allow attackers to gain control over these devices, enabling interception or manipulation of network traffic, launching further attacks within the internal network, or causing denial of service by disrupting network connectivity. This is particularly concerning for organizations relying on these devices for critical connectivity or those with less mature network segmentation. The lack of vendor response and patches increases the window of exposure. Additionally, compromised devices could be used as footholds for lateral movement or as part of botnets, amplifying the threat landscape. The medium CVSS score reflects that while the attack requires some privileges (PR:L), it does not require user interaction or complex conditions, making it a realistic threat if attackers gain limited access or exploit other vulnerabilities to escalate privileges.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, restrict remote access to the management interfaces of affected Linksys devices by limiting access to trusted IP ranges or disabling remote management entirely if not required. Network segmentation should isolate these extenders from sensitive internal networks to contain potential compromise. Monitoring network traffic for unusual patterns or command injection attempts targeting /cgi-bin/upload.cgi can aid early detection. Organizations should consider replacing vulnerable devices with updated models or alternative vendors that provide timely security updates. If firmware updates become available, prioritize their deployment. Additionally, enforce strong administrative credentials and regularly audit device configurations. Employ network intrusion detection systems (NIDS) with signatures for command injection attempts targeting Linksys devices. Finally, maintain an inventory of all affected devices to ensure comprehensive coverage of mitigation efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-9575: OS Command Injection in Linksys RE6250
Description
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function cgiMain of the file /cgi-bin/upload.cgi. Executing manipulation of the argument filename can lead to os command injection. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9575 is a medium-severity OS command injection vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the cgiMain function of the /cgi-bin/upload.cgi script, where improper sanitization of the 'filename' argument allows an attacker to inject arbitrary OS commands. This flaw can be exploited remotely without user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L), reflecting partial but significant control over the device. Although the vendor was notified early, no response or patch has been issued, and no known exploits are currently observed in the wild. The vulnerability's exploitation could allow attackers to execute arbitrary commands on affected devices, potentially leading to device compromise, network pivoting, or disruption of network services. Given the nature of the devices as network extenders, successful exploitation could undermine network security and availability for connected users.
Potential Impact
For European organizations, this vulnerability poses a tangible risk to network infrastructure security. Linksys range extenders are commonly used in small to medium enterprises and home office environments to extend Wi-Fi coverage. Exploitation could allow attackers to gain control over these devices, enabling interception or manipulation of network traffic, launching further attacks within the internal network, or causing denial of service by disrupting network connectivity. This is particularly concerning for organizations relying on these devices for critical connectivity or those with less mature network segmentation. The lack of vendor response and patches increases the window of exposure. Additionally, compromised devices could be used as footholds for lateral movement or as part of botnets, amplifying the threat landscape. The medium CVSS score reflects that while the attack requires some privileges (PR:L), it does not require user interaction or complex conditions, making it a realistic threat if attackers gain limited access or exploit other vulnerabilities to escalate privileges.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, restrict remote access to the management interfaces of affected Linksys devices by limiting access to trusted IP ranges or disabling remote management entirely if not required. Network segmentation should isolate these extenders from sensitive internal networks to contain potential compromise. Monitoring network traffic for unusual patterns or command injection attempts targeting /cgi-bin/upload.cgi can aid early detection. Organizations should consider replacing vulnerable devices with updated models or alternative vendors that provide timely security updates. If firmware updates become available, prioritize their deployment. Additionally, enforce strong administrative credentials and regularly audit device configurations. Employ network intrusion detection systems (NIDS) with signatures for command injection attempts targeting Linksys devices. Finally, maintain an inventory of all affected devices to ensure comprehensive coverage of mitigation efforts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-28T11:00:44.364Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b09d4cad5a09ad006ed795
Added to database: 8/28/2025, 6:17:48 PM
Last enriched: 9/4/2025, 6:41:10 PM
Last updated: 10/15/2025, 7:35:56 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11832: CWE-770 Allocation of Resources Without Limits or Throttling in Azure Access Technology BLU-IC2
CriticalWireTap and Battering RAM: attacks on TEEs | Kaspersky official blog
MediumCVE-2024-6592: CWE-306 Missing Authentication for Critical Function in WatchGuard Authentication Gateway
CriticalCVE-2025-62410: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in capricorn86 happy-dom
CriticalCVE-2025-62371: CWE-295: Improper Certificate Validation in opensearch-project data-prepper
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.