CVE-2025-60689
- EPSS 0.23%
- Veröffentlicht 13.11.2025 00:00:00
- Zuletzt bearbeitet 19.11.2025 17:30:38
An unauthenticated command injection vulnerability exists in the Start_EPI function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The vulnerability occurs because user-supplied CGI parameters (wl_ant, wl_ssid...
CVE-2025-60690
- EPSS 0.5%
- Veröffentlicht 13.11.2025 00:00:00
- Zuletzt bearbeitet 17.11.2025 19:55:11
A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to four user-supplied CGI parameters matching <parameter>_0~3 i...
CVE-2025-60691
- EPSS 0.5%
- Veröffentlicht 13.11.2025 00:00:00
- Zuletzt bearbeitet 17.11.2025 19:55:22
A stack-based buffer overflow exists in the httpd binary of Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The apply_cgi and block_cgi functions copy user-supplied input from the "url" CGI parameter into stack buffers (v36, v29) usi...
CVE-2025-60693
- EPSS 1.07%
- Veröffentlicht 13.11.2025 00:00:00
- Zuletzt bearbeitet 17.11.2025 19:55:48
A stack-based buffer overflow exists in the get_merge_mac function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to six user-supplied CGI parameters matching <parameter>_0~5 into ...
CVE-2013-3307
- EPSS 3.25%
- Veröffentlicht 11.07.2025 00:00:00
- Zuletzt bearbeitet 15.07.2025 13:14:49
Linksys E1000 devices through 2.1.02, E1200 devices before 2.0.05, and E3200 devices through 1.0.04 allow OS command injection via shell metacharacters in the apply.cgi ping_ip parameter on TCP port 52000.
- EPSS 80.48%
- Veröffentlicht 24.06.2025 01:15:25
- Zuletzt bearbeitet 20.11.2025 22:15:56
An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip param...