CVE-2025-60689Command Injection in Linksys E1200 Firmware

CWE-77Command Injection3 documents3 sources
Severity
5.4MEDIUMNVD
EPSS
0.1%
top 64.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 13

Description

An unauthenticated command injection vulnerability exists in the Start_EPI function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The vulnerability occurs because user-supplied CGI parameters (wl_ant, wl_ssid, wl_rate, ttcp_num, ttcp_ip, ttcp_size) are concatenated into system command strings without proper sanitization and executed via wl_exec_cmd. Successful exploitation allows remote attackers to execute arbitrary commands on the device without authen

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.5

Affected Packages1 packages

NVDlinksys/e1200_firmware2.0.11.001

🔴Vulnerability Details

2
GHSA
GHSA-7q4h-34hr-8m3p: An unauthenticated command injection vulnerability exists in the Start_EPI function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v22025-11-13
CVEList
CVE-2025-60689: An unauthenticated command injection vulnerability exists in the Start_EPI function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v22025-11-13
CVE-2025-60689 — Command Injection in Linksys | cvebase