CVE-2025-45487

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in the Linksys E5600 router's runtime.InternetConnection function. Attackers can execute arbitrary commands with root privileges by injecting malicious input. All users running the affected firmware version are vulnerable.

💻 Affected Systems

Products:
  • Linksys E5600
Versions: v1.1.0.26
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running this specific firmware version are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing persistent backdoor installation, credential theft, network pivoting, and participation in botnets.

🟠

Likely Case

Router takeover leading to DNS hijacking, traffic interception, credential harvesting, and lateral movement into connected devices.

🟢

If Mitigated

Limited impact if network segmentation isolates the router and external access is restricted.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them accessible to remote attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they gain network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept code is publicly available, making exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check Linksys support for firmware updates. 2. Download latest firmware from official site. 3. Access router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevents external attackers from accessing the vulnerable interface

Access router admin > Administration > Remote Management > Disable

Network Segmentation

all

Isolate router management interface from general network

🧯 If You Can't Patch

  • Replace affected device with a supported model
  • Implement strict network firewall rules to block all inbound traffic to router management interface

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under Administration > Firmware Upgrade

Check Version:

curl -s http://router-ip/status.cgi | grep firmware

Verify Fix Applied:

Verify firmware version is no longer v1.1.0.26 and test if exploit PoC no longer works

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts to admin interface
  • Suspicious process creation

Network Indicators:

  • Unexpected outbound connections from router
  • DNS queries to malicious domains
  • Port scanning originating from router

SIEM Query:

source="router-logs" AND ("runtime.InternetConnection" OR "command injection" OR suspicious shell commands)

🔗 References

📤 Share & Export