CVE-2025-34037
OS Command Injection in Linksys E-Series Routers Enables Remote Code Execution

Publication date: 2025-06-24

Last updated on: 2025-06-24

Assigner: [email protected]

Description
An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability is exploited in the wild by the "TheMoon" worm to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. This vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Affected Vendors & Products
Vendor Product Version
linksys wag_router *
linksys e-series_router *
linksys wes_router *
linksys wap_router *
linksys wireless_n_access_point *
linksys wet_router *
linksys wrt_series_router *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-20 Improper Input Validation
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?


How can this vulnerability impact me? :


How can this vulnerability be detected on my network or system? Can you suggest some commands?
E2500 and 1.0.07 build 1. Additionally, indicators of compromise include heavy outbound scanning on ports 80 and 8080 and inbound connection attempts to various ports below 1024. A sample command to detect vulnerability is: curl -i http://:8080/HNAP1/ and check for the XML response. [1]">


What immediate steps should I take to mitigate this vulnerability?


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
Meta Information
CVE Publication Date:
2025-06-24
CVE Last Modified Date:
2025-06-24
Report Generation Date:
2025-08-22
AI Powered Q&A Generation:
2025-06-24
EPSS Last Evaluated Date:
2025-08-20
NVD Report Link: