VYPR
High severity7.5NVD Advisory· Published Feb 25, 2026· Updated Apr 15, 2026

CVE-2026-27850

CVE-2026-27850

Description

Due to an improperly configured firewall rule, the router will accept any connection on the WAN port with the source port 5222, exposing all services which are normally only accessible through the local network. This issue affects MR9600: 1.0.4.205530; MX4200: 1.0.13.210200.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A misconfigured iptables rule in Linksys MR9600 and MX4200 routers accepts any WAN connection with source port 5222, exposing internal services to the internet.

Vulnerability

Overview

The Linksys MR9600 (firmware 1.0.4.205530) and MX4200 (firmware 1.0.13.210200) routers contain a firewall rule that improperly verifies the source of a communication channel (CWE-940). Specifically, the iptables chain wan2self_ports includes a rule that accepts all incoming TCP packets on the WAN interface (eth0) with source port 5222, bypassing the intended LAN-only access restrictions [1].

Exploitation

An attacker on the internet can send packets to the router's WAN IP address using source port 5222. The firewall will accept these packets and forward them to any service listening on the router's IP address (0.0.0.0). No authentication or prior knowledge of internal services is required beyond the router's public IP. This effectively exposes all local services—such as the web administration interface, UPnP, or other daemons—to the open internet [1].

Impact

Successful exploitation allows an unauthenticated remote attacker to interact with services that should only be accessible from the local network. This can lead to unauthorized configuration changes, information disclosure, or further compromise of the router and connected devices. The advisory notes that this is especially critical when combined with other vulnerabilities (e.g., SYSS-2025-009) that may be reachable through the exposed services [1].

Mitigation

Linksys has released firmware updates that correct the firewall rule. The fix was developed by 2025-06-24 and is included in later firmware versions for both MR9600 and MX4200. Users should update to the latest firmware available from the manufacturer's support site. No workaround is available other than applying the patch [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.