Unrated severityNVD Advisory· Published Jun 2, 2025· Updated Jun 2, 2025
Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 RP_checkFWByBBS os command injection
CVE-2025-5445
Description
A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this issue is the function RP_checkFWByBBS of the file /goform/RP_checkFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Affected products
9- Linksys/RE6250v5Range: 1.0.013.001
- Linksys/RE6300v5Range: 1.0.013.001
- Linksys/RE6350v5Range: 1.0.013.001
- Linksys/RE6500v5Range: 1.0.013.001
- Linksys/RE7000v5Range: 1.0.013.001
- Linksys/RE9000v5Range: 1.0.013.001
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_8/8.mdmitreexploit
- vuldb.commitrethird-party-advisory
- vuldb.commitresignaturepermissions-required
- vuldb.commitrevdb-entrytechnical-description
- www.linksys.commitreproduct
News mentions
0No linked articles in our index yet.