OS Command Injection Vulnerability in Linksys Routers
CVE-2025-9244
Key Information:
Badges
What is CVE-2025-9244?
A security flaw has been identified in multiple Linksys router models, specifically related to the addStaticRoute function in /goform/addStaticRoute. This vulnerability allows for the manipulation of critical parameters such as staticRoute_IP_setting, staticRoute_Netmask_setting, staticRoute_Gateway_setting, staticRoute_Metric_setting, and staticRoute_destType_setting, permitting an attacker to execute arbitrary OS commands remotely. The exploit has been publicly disclosed, raising significant concerns about potential unauthorized access and control. Immediate action is recommended for users of affected Linksys devices.
Affected Version(s)
RE6250 1.0.013.001
RE6250 1.0.04.001
RE6250 1.0.04.002
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved