Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27848: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Linksys MR9600

0
Critical
VulnerabilityCVE-2026-27848cvecve-2026-27848cwe-78
Published: Wed Feb 25 2026 (02/25/2026, 15:15:16 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: MR9600

Description

CVE-2026-27848 is an OS command injection vulnerability affecting Linksys MR9600 and MX4200 routers. The flaw arises from improper neutralization of special elements during the TLS-SRP handshake, allowing attackers to inject OS commands executed with root privileges. This vulnerability affects firmware versions MR9600 1. 0. 4. 205530 and MX4200 1. 0. 13. 210200. Exploitation does not require user interaction but may require network access to the device.

AI-Powered Analysis

AILast updated: 02/25/2026, 15:56:49 UTC

Technical Analysis

CVE-2026-27848 is a critical OS command injection vulnerability identified in Linksys MR9600 and MX4200 routers, specifically in firmware versions MR9600 1.0.4.205530 and MX4200 1.0.13.210200. The vulnerability stems from improper neutralization of special characters during the TLS-SRP (Transport Layer Security - Secure Remote Password) handshake process. This flaw allows an attacker to inject arbitrary OS commands that are executed with root privileges on the device. The root-level execution means the attacker gains full control over the router's operating system, enabling actions such as modifying configurations, intercepting or redirecting network traffic, installing persistent malware, or launching further attacks on connected networks. The attack vector involves manipulating the handshake messages in the TLS-SRP protocol, which is used for secure authentication. Since the vulnerability is triggered during the handshake, it can be exploited remotely by an attacker with network access to the device, without requiring user interaction. Although no public exploits have been reported yet, the nature of the vulnerability and its impact make it a high-risk issue. The lack of a CVSS score indicates that this is a newly disclosed vulnerability, and vendors or security organizations have not yet finalized a formal severity rating. The vulnerability is cataloged under CWE-78, which relates to improper neutralization of special elements used in OS commands, a common and dangerous injection flaw. The absence of patch links suggests that firmware updates addressing this issue may not yet be publicly available, emphasizing the need for immediate mitigation efforts by affected organizations.

Potential Impact

The impact of CVE-2026-27848 is severe for organizations using affected Linksys MR9600 and MX4200 routers. Exploitation grants attackers root-level access, enabling complete compromise of the device. This can lead to interception and manipulation of network traffic, disruption of network services, unauthorized access to internal networks, and potential lateral movement to other systems. For enterprises and service providers relying on these routers for critical connectivity, the vulnerability poses risks to confidentiality, integrity, and availability of data and services. Compromised routers can be used as footholds for broader attacks, including data exfiltration, ransomware deployment, or launching attacks against other targets. The ease of exploitation via network access without user interaction increases the likelihood of automated attacks once exploit code becomes available. The vulnerability also threatens home users and small businesses that use these routers, potentially exposing personal or sensitive information. Overall, the vulnerability undermines trust in network infrastructure and can cause significant operational and reputational damage.

Mitigation Recommendations

1. Immediate mitigation involves restricting network access to the affected routers, especially limiting exposure to untrusted networks such as the internet. 2. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 3. Disable or restrict TLS-SRP authentication if possible, or monitor for unusual handshake activity indicative of exploitation attempts. 4. Apply any available firmware updates from Linksys as soon as they are released to patch the vulnerability. 5. If patches are not yet available, consider temporary replacement of affected devices with models not impacted by this vulnerability. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous TLS handshake patterns or command injection attempts. 7. Conduct regular audits of router configurations and logs to identify signs of compromise. 8. Educate network administrators about this vulnerability and ensure incident response plans include steps for handling potential exploitation. 9. Coordinate with vendors and security communities for updates and exploit intelligence. 10. Consider deploying network-level firewall rules to block suspicious traffic targeting the TLS-SRP handshake process.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ENISA
Date Reserved
2026-02-24T07:07:48.974Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699f183fb7ef31ef0b2eb1d7

Added to database: 2/25/2026, 3:41:51 PM

Last enriched: 2/25/2026, 3:56:49 PM

Last updated: 2/25/2026, 7:11:06 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats