PT-2025-26664 · Linksys · Linksys E-Series
Johannes Ullrich
·
Published
2025-06-23
·
Updated
2025-10-10
·
CVE-2025-34037
CVSS v4.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H |
Name of the Vulnerable Software and Affected Versions
Linksys E-Series routers versions prior to a firmware update
Linksys E4200
Linksys E3200
Linksys E3000
Linksys E2500
Linksys E2100L
Linksys E2000
Linksys E1550
Linksys E1500
Linksys E1200
Linksys E1000
Linksys E900
Description
An OS command injection issue exists in Linksys E-Series routers. The vulnerability is present in the
/tmUnblock.cgi and /hndUnblock.cgi API endpoints accessible via HTTP on port 8080. The scripts do not properly sanitize user-supplied input provided through the ttcp ip parameter, allowing unauthenticated attackers to inject shell commands. This issue is actively exploited in the wild by the “TheMoon” worm, which deploys a MIPS ELF payload to achieve arbitrary code execution on the router. The worm is actively exploiting this flaw to infect devices.Recommendations
For Linksys E4200 routers, segment and monitor the network.
For Linksys E3200 routers, segment and monitor the network.
For Linksys E3000 routers, segment and monitor the network.
For Linksys E2500 routers, segment and monitor the network.
For Linksys E2100L routers, segment and monitor the network.
For Linksys E2000 routers, segment and monitor the network.
For Linksys E1550 routers, segment and monitor the network.
For Linksys E1500 routers, segment and monitor the network.
For Linksys E1200 routers, segment and monitor the network.
For Linksys E1000 routers, segment and monitor the network.
For Linksys E900 routers, segment and monitor the network.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
RCE
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-11591
CVE-2025-34037
Affected Products
Linksys E-Series
References · 16
- 🔥 https://exploit-db.com/exploits/31683 · Exploit
- https://bdu.fstec.ru/vul/2025-11591 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-34037 · Security Note
- https://twitter.com/CVEnew/status/1937344573002445267 · Twitter Post
- https://twitter.com/moton/status/1937508185369436332 · Twitter Post
- https://twitter.com/the_yellow_fall/status/1937449134551892008 · Twitter Post
- https://twitter.com/BaseFortify/status/1937434579167773104 · Twitter Post
- https://isc.sans.edu/diary/17633 · Note
- https://vulncheck.com/advisories/linksys-multiple-routers-command-injection · Note
- https://t.me/latest_high_impact_cve/2791 · Telegram Post
- https://twitter.com/VulmonFeeds/status/1937332477669921073 · Twitter Post
- https://t.me/pentestingnews/63318 · Telegram Post
- https://vulncheck.com/advisories/linksys-routers-command-injection · Note
- https://twitter.com/fridaysecurity/status/1937450411600019705 · Twitter Post
- https://t.me/true_secator/7514 · Telegram Post