OS Command Injection Vulnerability in Linksys Routers Including RE6500 and RE7000
CVE-2025-5444
Key Information:
Badges
What is CVE-2025-5444?
A serious vulnerability has been identified in multiple Linksys router models, specifically affecting the RP_UpgradeFWByBBS function in the firmware. This flaw allows for remote attackers to manipulate key input parameters, facilitating OS command injection through crafted requests. This type of attack poses a significant risk as it can lead to unauthorized access and control of the affected devices. Despite notifications sent to Linksys regarding this issue, no response was received, leaving users and their networks exposed to potential exploits.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
RE6250 1.0.013.001
RE6250 1.0.04.001
RE6250 1.0.04.002
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved