Логотип exploitDog
bind:CVE-2025-60689
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-60689

Количество 3

Количество 3

nvd логотип

CVE-2025-60689

3 месяца назад

An unauthenticated command injection vulnerability exists in the Start_EPI function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The vulnerability occurs because user-supplied CGI parameters (wl_ant, wl_ssid, wl_rate, ttcp_num, ttcp_ip, ttcp_size) are concatenated into system command strings without proper sanitization and executed via wl_exec_cmd. Successful exploitation allows remote attackers to execute arbitrary commands on the device without authentication.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-7q4h-34hr-8m3p

3 месяца назад

An unauthenticated command injection vulnerability exists in the Start_EPI function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The vulnerability occurs because user-supplied CGI parameters (wl_ant, wl_ssid, wl_rate, ttcp_num, ttcp_ip, ttcp_size) are concatenated into system command strings without proper sanitization and executed via wl_exec_cmd. Successful exploitation allows remote attackers to execute arbitrary commands on the device without authentication.

CVSS3: 5.4
EPSS: Низкий
fstec логотип

BDU:2025-14946

4 месяца назад

Уязвимость функции Start_EPI() микропрограммного обеспечения маршрутизаторов Linksys E1200, позволяющая нарушителю выполнить произвольные команды

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-60689

An unauthenticated command injection vulnerability exists in the Start_EPI function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The vulnerability occurs because user-supplied CGI parameters (wl_ant, wl_ssid, wl_rate, ttcp_num, ttcp_ip, ttcp_size) are concatenated into system command strings without proper sanitization and executed via wl_exec_cmd. Successful exploitation allows remote attackers to execute arbitrary commands on the device without authentication.

CVSS3: 5.4
0%
Низкий
3 месяца назад
github логотип
GHSA-7q4h-34hr-8m3p

An unauthenticated command injection vulnerability exists in the Start_EPI function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The vulnerability occurs because user-supplied CGI parameters (wl_ant, wl_ssid, wl_rate, ttcp_num, ttcp_ip, ttcp_size) are concatenated into system command strings without proper sanitization and executed via wl_exec_cmd. Successful exploitation allows remote attackers to execute arbitrary commands on the device without authentication.

CVSS3: 5.4
0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-14946

Уязвимость функции Start_EPI() микропрограммного обеспечения маршрутизаторов Linksys E1200, позволяющая нарушителю выполнить произвольные команды

CVSS3: 5.4
0%
Низкий
4 месяца назад

Уязвимостей на страницу