Linksys RE Series, OS Command Injection, CVE-2025-5441 (Critical)

Listen to this Post

How the CVE Works

The vulnerability (CVE-2025-5441) in Linksys RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000 routers stems from improper input validation in the `setDeviceURL` function within /goform/setDeviceURL. An attacker can inject malicious OS commands via the `DeviceURL` parameter, leading to remote code execution. The flaw is exploitable without authentication, allowing attackers to manipulate device settings, execute arbitrary commands, or compromise the router. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L) highlights its network-based attack vector and high impact on confidentiality, integrity, and availability.

DailyCVE Form

Platform: Linksys RE Series
Version: 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001
Vulnerability: OS Command Injection
Severity: Critical
Date: 06/25/2025

Prediction: Patch by Q3 2025

What Undercode Say

curl -X POST -d "DeviceURL=;malicious_command" http://router_ip/goform/setDeviceURL
import requests
requests.post("http://router_ip/goform/setDeviceURL", data={"DeviceURL": ";reboot"})

How Exploit

  • Remote command execution via crafted `DeviceURL` parameter.
  • Exploits lack of input sanitization in firmware.

Protection from this CVE

  • Disable remote administration.
  • Apply vendor patch (when released).
  • Use network segmentation.

Impact

  • Full device compromise.
  • Unauthorized network access.
  • Data exfiltration.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top