Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linksys — Vulnerabilities & Security Advisories 93

Browse all 93 CVE security advisories affecting Linksys. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linksys operates primarily as a manufacturer of consumer networking hardware, including wireless routers and mesh systems, facilitating home and small office internet connectivity. Security audits have identified 93 Common Vulnerabilities and Exposures (CVEs) associated with its product line, predominantly stemming from embedded Linux-based firmware. Historically, the most prevalent vulnerability classes involve Remote Code Execution (RCE) and Cross-Site Scripting (XSS), often exploited through unauthenticated access to web management interfaces. Privilege escalation flaws also frequently appear, allowing attackers to gain administrative control over devices. Notable incidents include critical flaws in older WRT series routers that permitted full system compromise without user interaction. These issues largely result from insufficient input validation and hardcoded credentials in legacy firmware versions. While newer models have improved security postures, the historical pattern highlights significant risks in maintaining long-term support for consumer-grade networking equipment with complex embedded software stacks.

CVE IDTitleCVSSSeverityPublished
CVE-2026-6992 Linksys MR9600 JNAP Action run_central2.sh BTRequestGetSmartConnectStatus os command injection — MR9600CWE-78 7.2 High2026-04-25
CVE-2026-4558 Linksys MR9600 SmartConnect.lua smartConnectConfigure os command injection — MR9600CWE-78 8.8 High2026-03-22
CVE-2026-27850 Improper verification in Linksys MR9600, Linksys MX4200 — MR9600 6.5AIMediumAI2026-02-25
CVE-2026-27849 Missing neutralization in Linksys MR9600, Linksys MX4200 — MR9600CWE-78 8.8AIHighAI2026-02-25
CVE-2026-27848 Missing neutralization in Linksys MR9600, Linksys MX4200 — MR9600CWE-78 9.8AICriticalAI2026-02-25
CVE-2026-27847 Missing authentication in Linksys MR9600, Linksys MX4200 — MR9600CWE-89 9.8AICriticalAI2026-02-25
CVE-2026-27846 Missing authentication in Linksys MR9600, Linksys MX4200 — MR9600CWE-306 4.6AIMediumAI2026-02-25
CVE-2026-25603 Path Traversal vulnerability in Linksys MR9600, Linksys MX4200 — MR9600CWE-22 6.8AIMediumAI2026-02-24
CVE-2025-52692 Bypass Authentication — Linksys E9450-SG 8.8 High2025-12-19
CVE-2025-14136 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so stack-based overflow — RE6500CWE-121 8.8 High2025-12-06
CVE-2025-14135 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so AP_get_wired_clientlist_setClientsName stack-based overflow — RE6500CWE-121 8.8 High2025-12-06
CVE-2025-14134 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so stack-based overflow — RE6500CWE-121 8.8 High2025-12-06
CVE-2025-14133 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so AP_get_wireless_clientlist_setClientsName stack-based overflow — RE6500CWE-121 8.8 High2025-12-06
CVE-2025-9575 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 upload.cgi cgiMain os command injection — RE6250CWE-78 6.3 Medium2025-08-28
CVE-2025-9528 Linksys E1700 systemCommand os command injection — E1700CWE-78 4.7 Medium2025-08-27
CVE-2025-9527 Linksys E1700 QoSSetup stack-based overflow — E1700CWE-121 8.8 High2025-08-27
CVE-2025-9526 Linksys E1700 setSysAdm stack-based overflow — E1700CWE-121 8.8 High2025-08-27
CVE-2025-9525 Linksys E1700 setWan stack-based overflow — E1700CWE-121 8.8 High2025-08-27
CVE-2025-9483 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 singlePortForwardAdd stack-based overflow — RE6250CWE-121 8.8 High2025-08-26
CVE-2025-9482 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 portRangeForwardAdd stack-based overflow — RE6250CWE-121 8.8 High2025-08-26
CVE-2025-9481 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setIpv6 stack-based overflow — RE6250CWE-121 8.8 High2025-08-26
CVE-2025-9393 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 addStaProfile stack-based overflow — RE6250CWE-121 8.8 High2025-08-24
CVE-2025-9392 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 qosClassifier stack-based overflow — RE6250CWE-121 8.8 High2025-08-24
CVE-2025-9363 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 portTriggerManageRule stack-based overflow — RE6250CWE-121 8.8 High2025-08-23
CVE-2025-9362 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 urlFilterManageRule stack-based overflow — RE6250CWE-121 6.3 Medium2025-08-23
CVE-2025-9361 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 ipRangeBlockManageRule stack-based overflow — RE6250CWE-121 8.8 High2025-08-23
CVE-2025-9360 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 accessControlAdd stack-based overflow — RE6250CWE-121 8.8 High2025-08-23
CVE-2025-9359 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_checkCredentialsByBBS stack-based overflow — RE6250CWE-121 8.8 High2025-08-23
CVE-2025-9358 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setSysAdm stack-based overflow — RE6250CWE-121 8.8 High2025-08-23
CVE-2025-9357 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 langSwitchByBBS stack-based overflow — RE6250CWE-121 8.8 High2025-08-23

This page lists every published CVE security advisory associated with Linksys. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.