CVE-2025-29226

6.3 MEDIUM

📋 TL;DR

This CVE describes a command injection vulnerability in Linksys E5600 routers where an attacker can execute arbitrary commands via the pt["count"] parameter in the runtime.pingTest function. This affects Linksys E5600 V1.1.0.26 routers, potentially allowing remote code execution on the device.

💻 Affected Systems

Products:
  • Linksys E5600
Versions: V1.1.0.26
Operating Systems: Embedded Linux/Lua runtime
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version mentioned; other versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the router allowing attacker to intercept traffic, modify configurations, install persistent backdoors, or pivot to internal network devices.

🟠

Likely Case

Router compromise leading to network disruption, credential theft from connected devices, or installation of malware.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted access and proper network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them accessible to remote attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access, but requires specific targeting.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains proof-of-concept demonstrating exploitation. Command injection vulnerabilities are frequently weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Linksys support for firmware updates. 2. If update available, download from official Linksys site. 3. Log into router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to router administration interface to trusted IP addresses only.

Disable Unnecessary Services

all

Disable ping test functionality if not required for operations.

🧯 If You Can't Patch

  • Isolate router in separate network segment with strict firewall rules
  • Implement network monitoring for unusual outbound connections from router

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is V1.1.0.26, device is vulnerable.

Check Version:

Check via router web interface: Login > Administration > Firmware Upgrade

Verify Fix Applied:

Verify firmware version has been updated to a version later than V1.1.0.26.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple ping requests with abnormal parameters
  • Unauthorized configuration changes

Network Indicators:

  • Unexpected outbound connections from router
  • Unusual traffic patterns to/from router management interface

SIEM Query:

source="router.log" AND ("pingTest" OR "runtime.lua") AND (command="*" OR shell="*")

🔗 References

📤 Share & Export