Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27847: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Linksys MR9600

0
High
VulnerabilityCVE-2026-27847cvecve-2026-27847cwe-89
Published: Wed Feb 25 2026 (02/25/2026, 15:10:30 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: MR9600

Description

CVE-2026-27847 is a SQL Injection vulnerability affecting Linksys MR9600 and MX4200 routers due to improper neutralization of special elements in SQL commands during the TLS-SRP handshake. An attacker can inject SQL statements to insert known credentials into the device's database, enabling unauthorized access to protected services. This flaw impacts specific firmware versions 1. 0. 4. 205530 (MR9600) and 1. 0. 13. 210200 (MX4200). Exploitation does not require user interaction but does require network access to the device's TLS-SRP handshake process.

AI-Powered Analysis

AILast updated: 02/25/2026, 15:57:06 UTC

Technical Analysis

CVE-2026-27847 is a vulnerability classified under CWE-89 (SQL Injection) that affects Linksys MR9600 and MX4200 routers running specific firmware versions. The root cause is improper neutralization of special elements in SQL commands during the TLS-SRP (Transport Layer Security - Secure Remote Password) handshake process. This handshake is used to establish a secure connection with mutual authentication. The vulnerability allows an attacker to inject crafted SQL statements into the device's backend database by manipulating the handshake data. Specifically, the attacker can insert known credentials into the router's database, which can then be used to successfully complete the TLS-SRP handshake and gain unauthorized access to protected services on the device. This bypasses normal authentication mechanisms and can lead to full compromise of the router’s management interface or other protected functionalities. The affected firmware versions are MR9600 version 1.0.4.205530 and MX4200 version 1.0.13.210200. No CVSS score has been assigned yet, and no public exploits have been reported. The vulnerability requires network-level access to the device’s TLS-SRP handshake process but does not require user interaction. This flaw could be exploited by attackers on the same network segment or via exposed management interfaces, potentially allowing lateral movement or persistent access within a network.

Potential Impact

The impact of CVE-2026-27847 is significant for organizations using affected Linksys MR9600 and MX4200 routers. Successful exploitation can lead to unauthorized access to router management interfaces or other protected services, allowing attackers to alter device configurations, intercept or redirect network traffic, and potentially deploy further malware or conduct espionage. This compromises the confidentiality, integrity, and availability of network communications. Organizations relying on these routers for critical network infrastructure, including enterprise, government, and service provider environments, face risks of network disruption and data breaches. The vulnerability could facilitate lateral movement within internal networks, increasing the attack surface. Since the attack targets the TLS-SRP handshake, it undermines the security of the authentication process itself, making detection more difficult. The absence of known exploits currently reduces immediate risk, but the potential for weaponization remains high once exploit code becomes available.

Mitigation Recommendations

Organizations should immediately inventory their network to identify affected Linksys MR9600 and MX4200 devices running the vulnerable firmware versions. Although no official patches are currently linked, monitoring Linksys advisories for firmware updates addressing this vulnerability is critical. In the interim, restrict network access to router management interfaces by implementing strict firewall rules and network segmentation to limit exposure of TLS-SRP handshake endpoints. Disable remote management features if not required. Employ network intrusion detection systems (NIDS) to monitor for anomalous TLS handshake patterns indicative of injection attempts. Conduct regular audits of router logs for suspicious authentication attempts or unexpected credential insertions. Consider deploying compensating controls such as VPNs or zero-trust network access to protect management interfaces. Finally, plan for timely patch deployment once vendor updates become available to remediate the vulnerability fully.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ENISA
Date Reserved
2026-02-24T07:07:48.973Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699f183fb7ef31ef0b2eb1d4

Added to database: 2/25/2026, 3:41:51 PM

Last enriched: 2/25/2026, 3:57:06 PM

Last updated: 2/25/2026, 6:51:44 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats