10

CVE-2025-34037

An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability is exploited in the wild by the "TheMoon" worm to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. This vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinksys
Product E4200
Default Statusunaffected
Version < 1.0.06
Version 0
Status affected
VendorLinksys
Product E3200
Default Statusunaffected
Version < 1.0.05
Version 0
Status affected
VendorLinksys
Product E3000
Default Statusunaffected
Version < 1.0.06
Version 0
Status affected
VendorLinksys
Product E2500 v1/v2
Default Statusunaffected
Version < 2.0.00
Version 0
Status affected
VendorLinksys
Product E2100L v1
Default Statusunaffected
Version <= 1.0.05
Version 0
Status affected
VendorLinksys
Product E2000
Default Statusunaffected
Version 0
Status affected
VendorLinksys
Product E1550
Default Statusunaffected
Version <= 1.0.03
Version 0
Status affected
VendorLinksys
Product E1500 v1
Default Statusunaffected
Version < 1.0.06
Version 0
Status affected
VendorLinksys
Product E1200 v1
Default Statusunaffected
Version <= 1.0.04
Version 0
Status affected
VendorLinksys
Product E1000 v1
Default Statusunaffected
Version < 2.1.03
Version 0
Status affected
VendorLinksys
Product E900 v1
Default Statusunaffected
Version < 1.0.04
Version 0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 82.5% 0.992
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
disclosure@vulncheck.com 10 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.