CVE-2026-27847: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Linksys MR9600
Due to improper neutralization of special elements, SQL statements can be injected via the handshake of a TLS-SRP connection. This can be used to inject known credentials into the database that can be utilized to successfully complete the handshake and use the protected service. This issue affects MR9600: 1.0.4.205530; MX4200: 1.0.13.210200.
AI Analysis
Technical Summary
CVE-2026-27847 is a critical SQL injection vulnerability identified in Linksys MR9600 (version 1.0.4.205530) and MX4200 (version 1.0.13.210200) routers. The vulnerability stems from improper neutralization of special characters in SQL commands during the TLS-SRP (Transport Layer Security - Secure Remote Password) handshake process. Specifically, the handshake mechanism fails to sanitize input properly, allowing an attacker to inject malicious SQL statements into the backend database. This injection can be leveraged to insert known credentials into the device's authentication database, enabling the attacker to successfully complete the TLS-SRP handshake and gain unauthorized access to protected services on the device. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, making it highly dangerous. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with impacts spanning confidentiality, integrity, and availability. While no known exploits have been reported in the wild yet, the ease of exploitation and severity necessitate immediate attention. The affected devices are commonly used in enterprise and consumer environments, potentially exposing a broad range of users. The lack of available patches at the time of disclosure increases the urgency for interim mitigations.
Potential Impact
The exploitation of CVE-2026-27847 can have severe consequences for organizations worldwide. Attackers can bypass authentication mechanisms by injecting credentials, leading to unauthorized access to router management interfaces or protected services. This access can allow attackers to manipulate network configurations, intercept or redirect traffic, deploy malware, or launch further attacks within the network. The compromise of routers can undermine the confidentiality and integrity of sensitive data traversing the network and disrupt availability by causing service outages or denial of service conditions. Given the critical role of routers in network infrastructure, successful exploitation can lead to widespread operational disruptions, data breaches, and loss of trust. Organizations relying on Linksys MR9600 or MX4200 devices in critical environments such as government, healthcare, finance, or industrial sectors face heightened risks. The vulnerability's remote exploitability without authentication increases the attack surface and potential for automated mass exploitation campaigns once exploits become available.
Mitigation Recommendations
1. Immediate mitigation involves isolating affected devices from untrusted networks and restricting management access to trusted administrators only. 2. Monitor network traffic for unusual TLS-SRP handshake attempts or anomalous authentication patterns that could indicate exploitation attempts. 3. Employ network-level intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting SQL injection and abnormal TLS-SRP traffic. 4. Disable or limit TLS-SRP authentication if possible until patches are available. 5. Regularly audit router configurations and logs for unauthorized changes or access attempts. 6. Coordinate with Linksys for timely updates and apply patches as soon as they are released. 7. Consider deploying network segmentation to limit the impact of compromised devices. 8. Educate network administrators about this vulnerability and ensure incident response plans include steps for router compromise scenarios. 9. Use multi-factor authentication and strong credential policies on network devices to reduce risk from credential injection. 10. Maintain up-to-date asset inventories to quickly identify and remediate affected devices.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Netherlands, Italy, Spain
CVE-2026-27847: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Linksys MR9600
Description
Due to improper neutralization of special elements, SQL statements can be injected via the handshake of a TLS-SRP connection. This can be used to inject known credentials into the database that can be utilized to successfully complete the handshake and use the protected service. This issue affects MR9600: 1.0.4.205530; MX4200: 1.0.13.210200.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27847 is a critical SQL injection vulnerability identified in Linksys MR9600 (version 1.0.4.205530) and MX4200 (version 1.0.13.210200) routers. The vulnerability stems from improper neutralization of special characters in SQL commands during the TLS-SRP (Transport Layer Security - Secure Remote Password) handshake process. Specifically, the handshake mechanism fails to sanitize input properly, allowing an attacker to inject malicious SQL statements into the backend database. This injection can be leveraged to insert known credentials into the device's authentication database, enabling the attacker to successfully complete the TLS-SRP handshake and gain unauthorized access to protected services on the device. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, making it highly dangerous. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with impacts spanning confidentiality, integrity, and availability. While no known exploits have been reported in the wild yet, the ease of exploitation and severity necessitate immediate attention. The affected devices are commonly used in enterprise and consumer environments, potentially exposing a broad range of users. The lack of available patches at the time of disclosure increases the urgency for interim mitigations.
Potential Impact
The exploitation of CVE-2026-27847 can have severe consequences for organizations worldwide. Attackers can bypass authentication mechanisms by injecting credentials, leading to unauthorized access to router management interfaces or protected services. This access can allow attackers to manipulate network configurations, intercept or redirect traffic, deploy malware, or launch further attacks within the network. The compromise of routers can undermine the confidentiality and integrity of sensitive data traversing the network and disrupt availability by causing service outages or denial of service conditions. Given the critical role of routers in network infrastructure, successful exploitation can lead to widespread operational disruptions, data breaches, and loss of trust. Organizations relying on Linksys MR9600 or MX4200 devices in critical environments such as government, healthcare, finance, or industrial sectors face heightened risks. The vulnerability's remote exploitability without authentication increases the attack surface and potential for automated mass exploitation campaigns once exploits become available.
Mitigation Recommendations
1. Immediate mitigation involves isolating affected devices from untrusted networks and restricting management access to trusted administrators only. 2. Monitor network traffic for unusual TLS-SRP handshake attempts or anomalous authentication patterns that could indicate exploitation attempts. 3. Employ network-level intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting SQL injection and abnormal TLS-SRP traffic. 4. Disable or limit TLS-SRP authentication if possible until patches are available. 5. Regularly audit router configurations and logs for unauthorized changes or access attempts. 6. Coordinate with Linksys for timely updates and apply patches as soon as they are released. 7. Consider deploying network segmentation to limit the impact of compromised devices. 8. Educate network administrators about this vulnerability and ensure incident response plans include steps for router compromise scenarios. 9. Use multi-factor authentication and strong credential policies on network devices to reduce risk from credential injection. 10. Maintain up-to-date asset inventories to quickly identify and remediate affected devices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ENISA
- Date Reserved
- 2026-02-24T07:07:48.973Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 699f183fb7ef31ef0b2eb1d4
Added to database: 2/25/2026, 3:41:51 PM
Last enriched: 3/4/2026, 8:11:44 PM
Last updated: 4/12/2026, 12:16:23 AM
Views: 127
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.