CVE-2025-45491Command Injection in Linksys E5600 Firmware

Severity
9.8CRITICALNVD
EPSS
11.9%
top 6.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 6
Latest updateMay 19

Description

Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.ddnsStatus DynDNS function via the username parameter.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-33xq-rr72-hjfj: Linksys E5600 v12025-05-06
CVEList
CVE-2025-45491: Linksys E5600 v12025-05-06

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Linksys E5600 runtime.ddnsStatus Multiple Parameters Command Injection Attempt (CVE-2025-45488-2025-45491)2025-05-19

📋Vendor Advisories

1
Microsoft
An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).2024-08-13
CVE-2025-45491 — Command Injection in Linksys | cvebase