Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27846: CWE-306 Missing Authentication for Critical Function in Linksys MR9600

0
High
VulnerabilityCVE-2026-27846cvecve-2026-27846cwe-306
Published: Wed Feb 25 2026 (02/25/2026, 15:03:58 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: MR9600

Description

CVE-2026-27846 is a vulnerability in Linksys MR9600 and MX4200 routers caused by missing authentication on the mesh functionality. An attacker with physical access can add a new mesh device without authorization, enabling them to retrieve sensitive information such as admin web interface passwords and Wi-Fi credentials. This flaw affects specific firmware versions 1. 0. 4. 205530 (MR9600) and 1. 0. 13. 210200 (MX4200). Exploitation requires physical access but no authentication or user interaction beyond device proximity.

AI-Powered Analysis

AILast updated: 02/25/2026, 15:57:22 UTC

Technical Analysis

CVE-2026-27846 is a security vulnerability identified in Linksys MR9600 and MX4200 routers, specifically firmware versions 1.0.4.205530 and 1.0.13.210200 respectively. The root cause is a missing authentication mechanism on the mesh network functionality, categorized under CWE-306. This flaw allows an attacker who has physical access to the device to add a new mesh device to the network without any authentication checks. By exploiting this, the attacker can gain access to sensitive information stored on the router, including the administrator password for the web interface and Wi-Fi network passwords. The absence of authentication on this critical function means that the attacker bypasses normal security controls, potentially compromising the entire network managed by the router. Although no public exploits are currently known, the vulnerability poses a significant risk because physical access to network devices is often less protected in certain environments such as offices, public spaces, or shared residential buildings. The vulnerability affects two specific Linksys router models widely used in home and small business networks. The lack of an official patch at the time of publication means that mitigation relies on physical security and monitoring. This vulnerability highlights the importance of enforcing authentication on all critical device functions, especially those that can impact network security and confidentiality.

Potential Impact

The impact of CVE-2026-27846 is substantial for organizations and individuals using the affected Linksys MR9600 and MX4200 routers. An attacker with physical access can bypass authentication controls to add unauthorized mesh devices, leading to exposure of administrator credentials and Wi-Fi passwords. This compromises network confidentiality and integrity, enabling unauthorized network access, potential data interception, and lateral movement within the network. For businesses, this could lead to data breaches, disruption of operations, and loss of trust. In environments where physical access to network devices is not tightly controlled, such as co-working spaces, multi-tenant buildings, or public areas, the risk is elevated. The vulnerability could also facilitate further attacks, such as injecting malicious traffic or intercepting sensitive communications. Since no patches are currently available, affected organizations face prolonged exposure. The requirement for physical access limits remote exploitation but does not eliminate risk, especially in scenarios where devices are accessible to multiple users or visitors. Overall, the vulnerability threatens the confidentiality and integrity of network communications and administrative controls, posing a high risk to affected deployments.

Mitigation Recommendations

To mitigate CVE-2026-27846, organizations should implement strict physical security controls to prevent unauthorized access to Linksys MR9600 and MX4200 devices. This includes placing routers in locked or restricted areas and monitoring physical access logs where possible. Network administrators should regularly audit mesh network configurations to detect any unauthorized devices added to the mesh. Disabling mesh functionality temporarily may be considered if it is not required. Monitoring network traffic for unusual patterns or new device connections can help identify exploitation attempts. Organizations should stay informed about vendor updates and apply firmware patches promptly once released by Linksys. Additionally, changing default passwords and using strong, unique credentials for router administration can reduce risk. Employing network segmentation to isolate critical systems from Wi-Fi networks managed by these routers can limit potential lateral movement. Finally, educating staff about the risks of physical device access and encouraging vigilance can further reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ENISA
Date Reserved
2026-02-24T07:07:48.973Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699f183fb7ef31ef0b2eb1d1

Added to database: 2/25/2026, 3:41:51 PM

Last enriched: 2/25/2026, 3:57:22 PM

Last updated: 2/25/2026, 6:46:06 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats