CVE-2025-9575: OS Command Injection in Linksys RE6250
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function cgiMain of the file /cgi-bin/upload.cgi. Executing manipulation of the argument filename can lead to os command injection. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9575 is a security vulnerability identified in several Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically affecting firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the cgiMain function of the /cgi-bin/upload.cgi script, which processes file upload requests. By manipulating the 'filename' argument in this CGI script, an attacker can perform OS command injection, allowing arbitrary command execution on the underlying operating system. This vulnerability is remotely exploitable without requiring user interaction or authentication, which significantly increases its risk profile. The CVSS v4.0 base score is 5.3 (medium severity), reflecting the ease of network exploitation (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), indicating partial compromise potential. The vendor was notified but has not responded or issued patches, and no known exploits have been observed in the wild yet. Given the public disclosure and the nature of the vulnerability, attackers could develop exploits to gain unauthorized control over affected devices, potentially using them as pivot points within networks or for launching further attacks.
Potential Impact
For European organizations, this vulnerability presents a tangible risk, especially for those relying on Linksys range extenders in their network infrastructure. Successful exploitation could allow attackers to execute arbitrary commands on these devices, potentially leading to unauthorized access to internal networks, interception or manipulation of network traffic, and disruption of network availability. This is particularly concerning for small and medium enterprises (SMEs) and home office environments where such devices are common and may lack rigorous security monitoring. Compromise of these devices could facilitate lateral movement within corporate networks or be leveraged in botnet activities. The lack of vendor response and patches increases the window of exposure. Additionally, organizations in sectors with stringent data protection requirements (e.g., finance, healthcare) could face compliance risks if such devices are compromised and lead to data breaches.
Mitigation Recommendations
Organizations should immediately inventory their network to identify the presence of affected Linksys range extender models and firmware versions. Until official patches are available, it is recommended to disable remote management interfaces on these devices to prevent external exploitation. Network segmentation should be enforced to isolate these devices from critical infrastructure and sensitive data environments. Employing strict firewall rules to restrict access to the device management interfaces to trusted internal IP addresses can reduce exposure. Monitoring network traffic for unusual activity originating from these devices can help detect exploitation attempts. Where possible, consider replacing vulnerable devices with models from vendors that provide timely security updates. Additionally, organizations should engage with Linksys support channels to seek updates or mitigation guidance and stay informed about any forthcoming patches or advisories.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-9575: OS Command Injection in Linksys RE6250
Description
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function cgiMain of the file /cgi-bin/upload.cgi. Executing manipulation of the argument filename can lead to os command injection. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9575 is a security vulnerability identified in several Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically affecting firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the cgiMain function of the /cgi-bin/upload.cgi script, which processes file upload requests. By manipulating the 'filename' argument in this CGI script, an attacker can perform OS command injection, allowing arbitrary command execution on the underlying operating system. This vulnerability is remotely exploitable without requiring user interaction or authentication, which significantly increases its risk profile. The CVSS v4.0 base score is 5.3 (medium severity), reflecting the ease of network exploitation (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), indicating partial compromise potential. The vendor was notified but has not responded or issued patches, and no known exploits have been observed in the wild yet. Given the public disclosure and the nature of the vulnerability, attackers could develop exploits to gain unauthorized control over affected devices, potentially using them as pivot points within networks or for launching further attacks.
Potential Impact
For European organizations, this vulnerability presents a tangible risk, especially for those relying on Linksys range extenders in their network infrastructure. Successful exploitation could allow attackers to execute arbitrary commands on these devices, potentially leading to unauthorized access to internal networks, interception or manipulation of network traffic, and disruption of network availability. This is particularly concerning for small and medium enterprises (SMEs) and home office environments where such devices are common and may lack rigorous security monitoring. Compromise of these devices could facilitate lateral movement within corporate networks or be leveraged in botnet activities. The lack of vendor response and patches increases the window of exposure. Additionally, organizations in sectors with stringent data protection requirements (e.g., finance, healthcare) could face compliance risks if such devices are compromised and lead to data breaches.
Mitigation Recommendations
Organizations should immediately inventory their network to identify the presence of affected Linksys range extender models and firmware versions. Until official patches are available, it is recommended to disable remote management interfaces on these devices to prevent external exploitation. Network segmentation should be enforced to isolate these devices from critical infrastructure and sensitive data environments. Employing strict firewall rules to restrict access to the device management interfaces to trusted internal IP addresses can reduce exposure. Monitoring network traffic for unusual activity originating from these devices can help detect exploitation attempts. Where possible, consider replacing vulnerable devices with models from vendors that provide timely security updates. Additionally, organizations should engage with Linksys support channels to seek updates or mitigation guidance and stay informed about any forthcoming patches or advisories.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-28T11:00:44.364Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b09d4cad5a09ad006ed795
Added to database: 8/28/2025, 6:17:48 PM
Last enriched: 8/28/2025, 6:33:00 PM
Last updated: 8/31/2025, 8:12:05 AM
Views: 10
Related Threats
CVE-2025-9739: SQL Injection in Campcodes Online Water Billing System
MediumCVE-2025-9738: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-9737: Cross Site Scripting in O2OA
MediumCVE-2025-9736: Cross Site Scripting in O2OA
MediumCVE-2025-9735: Cross Site Scripting in O2OA
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.