Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-5440

Опубликовано: 02 июн. 2025
Источник: nvd
CVSS3: 6.3
CVSS3: 8.8
CVSS2: 6.5
EPSS Низкий

Описание

A vulnerability classified as critical has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function NTP of the file /goform/NTP. The manipulation of the argument manual_year_select/manual_month_select/manual_day_select/manual_hour_select/manual_min_select/manual_sec_select leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:linksys:re9000_firmware:1.0.04.002:*:*:*:*:*:*:*
cpe:2.3:h:linksys:re9000:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:linksys:re6250_firmware:1.0.04.001:*:*:*:*:*:*:*
cpe:2.3:h:linksys:re6250:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:linksys:re6300_firmware:1.2.07.001:*:*:*:*:*:*:*
cpe:2.3:h:linksys:re6300:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:linksys:re6350_firmware:1.0.04.001:*:*:*:*:*:*:*
cpe:2.3:h:linksys:re6350:-:*:*:*:*:*:*:*
Конфигурация 5

Одновременно

cpe:2.3:o:linksys:re7000_firmware:1.1.05.003:*:*:*:*:*:*:*
cpe:2.3:h:linksys:re7000:-:*:*:*:*:*:*:*
Конфигурация 6

Одновременно

cpe:2.3:o:linksys:re6500_firmware:1.0.013.001:*:*:*:*:*:*:*
cpe:2.3:h:linksys:re6500:-:*:*:*:*:*:*:*

EPSS

Процентиль: 46%
0.0023
Низкий

6.3 Medium

CVSS3

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 6.3
github
6 месяцев назад

A vulnerability classified as critical has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function NTP of the file /goform/NTP. The manipulation of the argument manual_year_select/manual_month_select/manual_day_select/manual_hour_select/manual_min_select/manual_sec_select leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 46%
0.0023
Низкий

6.3 Medium

CVSS3

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-77