Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-5445


A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this issue is the function RP_checkFWByBBS of the file /goform/RP_checkFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.


Published

2025-06-02T13:15:22.910

Last Modified

2025-06-10T15:15:02.610

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 6.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-77
    CWE-78
  • Type: Primary
    CWE-78

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linksys re9000_firmware 1.0.04.002 Yes
Hardware linksys re9000 - No
Operating System linksys re6250_firmware 1.0.04.001 Yes
Hardware linksys re6250 - No
Operating System linksys re6300_firmware 1.2.07.001 Yes
Hardware linksys re6300 - No
Operating System linksys re6350_firmware 1.0.04.001 Yes
Hardware linksys re6350 - No
Operating System linksys re7000_firmware 1.1.05.003 Yes
Hardware linksys re7000 - No
Operating System linksys re6500_firmware 1.0.013.001 Yes
Hardware linksys re6500 - No

References