Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-8828


A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function ipv6cmd of the file /goform/setIpv6. The manipulation of the argument Ipv6PriDns/Ipv6SecDns/Ipv6StaticGateway/LanIpv6Addr/LanPrefixLen/pppoeUser/pppoePass/pppoeIdleTime/pppoeRedialPeriod/Ipv6in4_PrefixLen/LocalIpv6/RemoteIpv4/LanIPv6_Prefix/LanPrefixLen/ipv6to4Relay/ipv6rdRelay/tunrd_PrefixLen/wan_UseLinkLocal/Ipv6StaticIp/Ipv6PrefixLen leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.


Published

2025-08-11T04:15:45.507

Last Modified

2025-09-04T18:36:46.993

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 6.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-77
    CWE-78

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linksys re6250_firmware 1.0.04.001 Yes
Hardware linksys re6250 - No
Operating System linksys re6300_firmware 1.2.07.001 Yes
Hardware linksys re6300 - No
Operating System linksys re6350_firmware 1.0.04.001 Yes
Hardware linksys re6350 - No
Operating System linksys re7000_firmware 1.1.05.003 Yes
Hardware linksys re7000 - No
Operating System linksys re9000_firmware 1.0.04.002 Yes
Hardware linksys re9000 - No
Operating System linksys re6500_firmware 1.0.013.001 Yes
Hardware linksys re6500 - No

References