Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linksys — Vulnerabilities & Security Advisories 93

Browse all 93 CVE security advisories affecting Linksys. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linksys operates primarily as a manufacturer of consumer networking hardware, including wireless routers and mesh systems, facilitating home and small office internet connectivity. Security audits have identified 93 Common Vulnerabilities and Exposures (CVEs) associated with its product line, predominantly stemming from embedded Linux-based firmware. Historically, the most prevalent vulnerability classes involve Remote Code Execution (RCE) and Cross-Site Scripting (XSS), often exploited through unauthenticated access to web management interfaces. Privilege escalation flaws also frequently appear, allowing attackers to gain administrative control over devices. Notable incidents include critical flaws in older WRT series routers that permitted full system compromise without user interaction. These issues largely result from insufficient input validation and hardcoded credentials in legacy firmware versions. While newer models have improved security postures, the historical pattern highlights significant risks in maintaining long-term support for consumer-grade networking equipment with complex embedded software stacks.

Found 14 results / 93Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2025-14136 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so stack-based overflow — RE6500CWE-121 8.8 High2025-12-06
CVE-2025-14135 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so AP_get_wired_clientlist_setClientsName stack-based overflow — RE6500CWE-121 8.8 High2025-12-06
CVE-2025-14134 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so stack-based overflow — RE6500CWE-121 8.8 High2025-12-06
CVE-2025-14133 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so AP_get_wireless_clientlist_setClientsName stack-based overflow — RE6500CWE-121 8.8 High2025-12-06
CVE-2025-5447 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 ssid1MACFilter os command injection — RE6500CWE-78 6.3 Medium2025-06-02
CVE-2025-5446 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 RP_checkCredentialsByBBS os command injection — RE6500CWE-78 6.3 Medium2025-06-02
CVE-2025-5445 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 RP_checkFWByBBS os command injection — RE6500CWE-78 6.3 Medium2025-06-02
CVE-2025-5444 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 RP_UpgradeFWByBBS os command injection — RE6500CWE-78 6.3 Medium2025-06-02
CVE-2025-5443 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 wirelessAdvancedHidden os command injection — RE6500CWE-78 6.3 Medium2025-06-02
CVE-2025-5442 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 RP_pingGatewayByBBS os command injection — RE6500CWE-78 6.3 Medium2025-06-02
CVE-2025-5441 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 setDeviceURL os command injection — RE6500CWE-78 6.3 Medium2025-06-02
CVE-2025-5440 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 NTP os command injection — RE6500CWE-78 6.3 Medium2025-06-02
CVE-2025-5439 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 verifyFacebookLike os command injection — RE6500CWE-78 6.3 Medium2025-06-02
CVE-2025-5438 Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 WPS command injection — RE6500CWE-77 6.3 Medium2025-06-02

This page lists every published CVE security advisory associated with Linksys. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.