10

CVE-2025-34037

Linksys Routers E/WAG/WAP/WES/WET/WRT-Series

An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability was reported to be exploited in the wild by the "TheMoon" worm  in 2014 to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. Additionally, this vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinksys
Produkt E4200
Default Statusunaffected
Version 0
Version < 1.0.06
Status affected
HerstellerLinksys
Produkt E3200
Default Statusunaffected
Version 0
Version < 1.0.05
Status affected
HerstellerLinksys
Produkt E3000
Default Statusunaffected
Version 0
Version < 1.0.06
Status affected
HerstellerLinksys
Produkt E2500 v1/v2
Default Statusunaffected
Version 0
Version < 2.0.00
Status affected
HerstellerLinksys
Produkt E2100L v1
Default Statusunaffected
Version <= 1.0.05
Version 0
Status affected
HerstellerLinksys
Produkt E2000
Default Statusunaffected
Version 0
Status affected
HerstellerLinksys
Produkt E1550
Default Statusunaffected
Version <= 1.0.03
Version 0
Status affected
HerstellerLinksys
Produkt E1500 v1
Default Statusunaffected
Version 0
Version < 1.0.06
Status affected
HerstellerLinksys
Produkt E1200 v1
Default Statusunaffected
Version <= 1.0.04
Version 0
Status affected
HerstellerLinksys
Produkt E1000 v1
Default Statusunaffected
Version 0
Version < 2.1.03
Status affected
HerstellerLinksys
Produkt E900 v1
Default Statusunaffected
Version 0
Version < 1.0.04
Status affected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 89.27% 0.996
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
disclosure@vulncheck.com 10 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.