Severity
5.3MEDIUM
EPSS
0.3%
top 50.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 28

Description

A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function cgiMain of the file /cgi-bin/upload.cgi. Executing manipulation of the argument filename can lead to os command injection. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages12 packages

CVEListV5linksys/re62505 versions+4
CVEListV5linksys/re63005 versions+4
CVEListV5linksys/re63505 versions+4
CVEListV5linksys/re65005 versions+4
CVEListV5linksys/re70005 versions+4

🔴Vulnerability Details

2
GHSA
GHSA-qh3h-2x77-r3c4: A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 12025-08-28
CVEList
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 upload.cgi cgiMain os command injection2025-08-28

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Linksys upload filename Parameter Command Injection Attempt (CVE-2025-9575)2025-06-04
CVE-2025-9575 (MEDIUM CVSS 5.3) | A vulnerability was determined in L | cvebase.io