CVE-2025-8828
Description
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function ipv6cmd of the file /goform/setIpv6. The manipulation of the argument Ipv6PriDns/Ipv6SecDns/Ipv6StaticGateway/LanIpv6Addr/LanPrefixLen/pppoeUser/pppoePass/pppoeIdleTime/pppoeRedialPeriod/Ipv6in4_PrefixLen/LocalIpv6/RemoteIpv4/LanIPv6_Prefix/LanPrefixLen/ipv6to4Relay/ipv6rdRelay/tunrd_PrefixLen/wan_UseLinkLocal/Ipv6StaticIp/Ipv6PrefixLen leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Affected products
6- cpe:2.3:o:linksys:re6250_firmware:1.0.04.001:*:*:*:*:*:*:*
- cpe:2.3:o:linksys:re6300_firmware:1.2.07.001:*:*:*:*:*:*:*
- cpe:2.3:o:linksys:re6350_firmware:1.0.04.001:*:*:*:*:*:*:*
- cpe:2.3:o:linksys:re6500_firmware:1.0.013.001:*:*:*:*:*:*:*
- cpe:2.3:o:linksys:re7000_firmware:1.1.05.003:*:*:*:*:*:*:*
- cpe:2.3:o:linksys:re9000_firmware:1.0.04.002:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.mdnvdExploitThird Party Advisory
- github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.mdnvdExploitThird Party Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdPermissions RequiredVDB Entry
- www.linksys.comnvdProduct
News mentions
0No linked articles in our index yet.