10
CVE-2025-34037
- EPSS 82.5%
- Veröffentlicht 24.06.2025 01:15:25
- Zuletzt bearbeitet 26.06.2025 18:58:14
- Quelle disclosure@vulncheck.com
- Teams Watchlist Login
- Unerledigt Login
An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability is exploited in the wild by the "TheMoon" worm to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. This vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinksys
≫
Produkt
E4200
Default Statusunaffected
Version <
1.0.06
Version
0
Status
affected
HerstellerLinksys
≫
Produkt
E3200
Default Statusunaffected
Version <
1.0.05
Version
0
Status
affected
HerstellerLinksys
≫
Produkt
E3000
Default Statusunaffected
Version <
1.0.06
Version
0
Status
affected
HerstellerLinksys
≫
Produkt
E2500 v1/v2
Default Statusunaffected
Version <
2.0.00
Version
0
Status
affected
HerstellerLinksys
≫
Produkt
E2100L v1
Default Statusunaffected
Version <=
1.0.05
Version
0
Status
affected
HerstellerLinksys
≫
Produkt
E2000
Default Statusunaffected
Version
0
Status
affected
HerstellerLinksys
≫
Produkt
E1550
Default Statusunaffected
Version <=
1.0.03
Version
0
Status
affected
HerstellerLinksys
≫
Produkt
E1500 v1
Default Statusunaffected
Version <
1.0.06
Version
0
Status
affected
HerstellerLinksys
≫
Produkt
E1200 v1
Default Statusunaffected
Version <=
1.0.04
Version
0
Status
affected
HerstellerLinksys
≫
Produkt
E1000 v1
Default Statusunaffected
Version <
2.1.03
Version
0
Status
affected
HerstellerLinksys
≫
Produkt
E900 v1
Default Statusunaffected
Version <
1.0.04
Version
0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 82.5% | 0.992 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
disclosure@vulncheck.com | 10 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.