CVE-2025-34037
OS Command Injection in Linksys E-Series Routers Enables Remote Code Execution
Description
Description
An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability is exploited in the wild by the "TheMoon" worm to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. This vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers.
CVSS Scores
EPSS Scores
Probability: | |
Percentile: |
Affected Vendors & Products
Vendor | Product | Version |
---|---|---|
linksys | wag_router | * |
linksys | e-series_router | * |
linksys | wes_router | * |
linksys | wap_router | * |
linksys | wireless_n_access_point | * |
linksys | wet_router | * |
linksys | wrt_series_router | * |
Helpful Resources
Exploitability
CWE ID | Description |
---|---|
CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
CWE-20 | Improper Input Validation |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
How can this vulnerability impact me? :
How can this vulnerability be detected on my network or system? Can you suggest some commands?
E2500 and 1.0.07 build 1 . Additionally, indicators of compromise include heavy outbound scanning on ports 80 and 8080 and inbound connection attempts to various ports below 1024. A sample command to detect vulnerability is: curl -i http://:8080/HNAP1/ and check for the XML response. [1]">
What immediate steps should I take to mitigate this vulnerability?
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
Meta Information
CVE Publication Date:
2025-06-24
CVE Last Modified Date:
2025-06-24
Report Generation Date:
2025-08-22
AI Powered Q&A Generation:
2025-06-24
EPSS Last Evaluated Date:
2025-08-20
NVD Report Link: