CVE-2026-27847: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Linksys MR9600
CVE-2026-27847 is a SQL Injection vulnerability affecting Linksys MR9600 and MX4200 routers due to improper neutralization of special elements in SQL commands during the TLS-SRP handshake. An attacker can inject SQL statements to insert known credentials into the device's database, enabling unauthorized access to protected services. This flaw impacts specific firmware versions 1. 0. 4. 205530 (MR9600) and 1. 0. 13. 210200 (MX4200). Exploitation does not require user interaction but does require network access to the device's TLS-SRP handshake process.
AI Analysis
Technical Summary
CVE-2026-27847 is a vulnerability classified under CWE-89 (SQL Injection) that affects Linksys MR9600 and MX4200 routers running specific firmware versions. The root cause is improper neutralization of special elements in SQL commands during the TLS-SRP (Transport Layer Security - Secure Remote Password) handshake process. This handshake is used to establish a secure connection with mutual authentication. The vulnerability allows an attacker to inject crafted SQL statements into the device's backend database by manipulating the handshake data. Specifically, the attacker can insert known credentials into the router's database, which can then be used to successfully complete the TLS-SRP handshake and gain unauthorized access to protected services on the device. This bypasses normal authentication mechanisms and can lead to full compromise of the router’s management interface or other protected functionalities. The affected firmware versions are MR9600 version 1.0.4.205530 and MX4200 version 1.0.13.210200. No CVSS score has been assigned yet, and no public exploits have been reported. The vulnerability requires network-level access to the device’s TLS-SRP handshake process but does not require user interaction. This flaw could be exploited by attackers on the same network segment or via exposed management interfaces, potentially allowing lateral movement or persistent access within a network.
Potential Impact
The impact of CVE-2026-27847 is significant for organizations using affected Linksys MR9600 and MX4200 routers. Successful exploitation can lead to unauthorized access to router management interfaces or other protected services, allowing attackers to alter device configurations, intercept or redirect network traffic, and potentially deploy further malware or conduct espionage. This compromises the confidentiality, integrity, and availability of network communications. Organizations relying on these routers for critical network infrastructure, including enterprise, government, and service provider environments, face risks of network disruption and data breaches. The vulnerability could facilitate lateral movement within internal networks, increasing the attack surface. Since the attack targets the TLS-SRP handshake, it undermines the security of the authentication process itself, making detection more difficult. The absence of known exploits currently reduces immediate risk, but the potential for weaponization remains high once exploit code becomes available.
Mitigation Recommendations
Organizations should immediately inventory their network to identify affected Linksys MR9600 and MX4200 devices running the vulnerable firmware versions. Although no official patches are currently linked, monitoring Linksys advisories for firmware updates addressing this vulnerability is critical. In the interim, restrict network access to router management interfaces by implementing strict firewall rules and network segmentation to limit exposure of TLS-SRP handshake endpoints. Disable remote management features if not required. Employ network intrusion detection systems (NIDS) to monitor for anomalous TLS handshake patterns indicative of injection attempts. Conduct regular audits of router logs for suspicious authentication attempts or unexpected credential insertions. Consider deploying compensating controls such as VPNs or zero-trust network access to protect management interfaces. Finally, plan for timely patch deployment once vendor updates become available to remediate the vulnerability fully.
Affected Countries
United States, Canada, Germany, United Kingdom, Australia, Japan, France, Netherlands, South Korea
CVE-2026-27847: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Linksys MR9600
Description
CVE-2026-27847 is a SQL Injection vulnerability affecting Linksys MR9600 and MX4200 routers due to improper neutralization of special elements in SQL commands during the TLS-SRP handshake. An attacker can inject SQL statements to insert known credentials into the device's database, enabling unauthorized access to protected services. This flaw impacts specific firmware versions 1. 0. 4. 205530 (MR9600) and 1. 0. 13. 210200 (MX4200). Exploitation does not require user interaction but does require network access to the device's TLS-SRP handshake process.
AI-Powered Analysis
Technical Analysis
CVE-2026-27847 is a vulnerability classified under CWE-89 (SQL Injection) that affects Linksys MR9600 and MX4200 routers running specific firmware versions. The root cause is improper neutralization of special elements in SQL commands during the TLS-SRP (Transport Layer Security - Secure Remote Password) handshake process. This handshake is used to establish a secure connection with mutual authentication. The vulnerability allows an attacker to inject crafted SQL statements into the device's backend database by manipulating the handshake data. Specifically, the attacker can insert known credentials into the router's database, which can then be used to successfully complete the TLS-SRP handshake and gain unauthorized access to protected services on the device. This bypasses normal authentication mechanisms and can lead to full compromise of the router’s management interface or other protected functionalities. The affected firmware versions are MR9600 version 1.0.4.205530 and MX4200 version 1.0.13.210200. No CVSS score has been assigned yet, and no public exploits have been reported. The vulnerability requires network-level access to the device’s TLS-SRP handshake process but does not require user interaction. This flaw could be exploited by attackers on the same network segment or via exposed management interfaces, potentially allowing lateral movement or persistent access within a network.
Potential Impact
The impact of CVE-2026-27847 is significant for organizations using affected Linksys MR9600 and MX4200 routers. Successful exploitation can lead to unauthorized access to router management interfaces or other protected services, allowing attackers to alter device configurations, intercept or redirect network traffic, and potentially deploy further malware or conduct espionage. This compromises the confidentiality, integrity, and availability of network communications. Organizations relying on these routers for critical network infrastructure, including enterprise, government, and service provider environments, face risks of network disruption and data breaches. The vulnerability could facilitate lateral movement within internal networks, increasing the attack surface. Since the attack targets the TLS-SRP handshake, it undermines the security of the authentication process itself, making detection more difficult. The absence of known exploits currently reduces immediate risk, but the potential for weaponization remains high once exploit code becomes available.
Mitigation Recommendations
Organizations should immediately inventory their network to identify affected Linksys MR9600 and MX4200 devices running the vulnerable firmware versions. Although no official patches are currently linked, monitoring Linksys advisories for firmware updates addressing this vulnerability is critical. In the interim, restrict network access to router management interfaces by implementing strict firewall rules and network segmentation to limit exposure of TLS-SRP handshake endpoints. Disable remote management features if not required. Employ network intrusion detection systems (NIDS) to monitor for anomalous TLS handshake patterns indicative of injection attempts. Conduct regular audits of router logs for suspicious authentication attempts or unexpected credential insertions. Consider deploying compensating controls such as VPNs or zero-trust network access to protect management interfaces. Finally, plan for timely patch deployment once vendor updates become available to remediate the vulnerability fully.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ENISA
- Date Reserved
- 2026-02-24T07:07:48.973Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 699f183fb7ef31ef0b2eb1d4
Added to database: 2/25/2026, 3:41:51 PM
Last enriched: 2/25/2026, 3:57:06 PM
Last updated: 2/25/2026, 6:51:44 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3206: CWE-404 Improper Resource Shutdown or Release in KrakenD KrakenD-CE
LowCVE-2026-27848: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Linksys MR9600
CriticalCVE-2026-27846: CWE-306 Missing Authentication for Critical Function in Linksys MR9600
HighCVE-2026-27704: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in dart-lang sdk
MediumCVE-2026-27701: CWE-94: Improper Control of Generation of Code ('Code Injection') in live-codes livecodes
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.