OS Command Injection Vulnerability in Linksys MR9600 by Linksys
CVE-2026-6992
Key Information:
Badges
What is CVE-2026-6992?
An OS command injection vulnerability exists in the Linksys MR9600 router, specifically within the JNAP Action Handler. The issue arises from inadequate validation of the 'pin' argument in the function BTRequestGetSmartConnectStatus located in the run_central2.sh script. By exploiting this vulnerability, an attacker could potentially execute arbitrary commands on the device, posing a significant risk to network integrity. The vulnerability allows remote attackers to initiate an exploit, which is publicly documented. Immediate attention and remediation are recommended to safeguard affected systems.
Affected Version(s)
MR9600 2.0.6.206937
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved