CVE-2025-45489

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in Linksys E5600 routers that allows attackers to execute arbitrary commands on the device by manipulating the hostname parameter in the DynDNS function. Attackers can gain full control of affected routers, potentially compromising network security. All users running the vulnerable firmware version are affected.

💻 Affected Systems

Products:
  • Linksys E5600
Versions: v1.1.0.26
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the runtime.ddnsStatus DynDNS function; exploitation requires DynDNS to be configured or accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router leading to persistent backdoor installation, network traffic interception, credential theft, and lateral movement to connected devices.

🟠

Likely Case

Router takeover enabling DNS hijacking, credential harvesting, and use as a pivot point for attacking internal network resources.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access and DynDNS is disabled.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and the vulnerability can be exploited remotely via DynDNS configuration.
🏢 Internal Only: MEDIUM - While primarily internet-facing, internal attackers could exploit if they gain network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Proof-of-concept exploit code is publicly available on GitHub; exploitation requires access to DynDNS configuration interface which typically requires authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check Linksys support site for firmware updates. 2. Download latest firmware. 3. Access router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable DynDNS

all

Turn off Dynamic DNS functionality to remove the vulnerable attack surface.

Restrict Admin Access

all

Limit admin interface access to specific IP addresses or disable remote administration.

🧯 If You Can't Patch

  • Isolate router in separate network segment with strict firewall rules
  • Implement network monitoring for suspicious command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface; if version is v1.1.0.26, device is vulnerable.

Check Version:

Check via router web interface at Administration > Firmware Upgrade or via SSH if enabled: cat /etc/version

Verify Fix Applied:

Verify firmware version has been updated to a version later than v1.1.0.26.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed DynDNS configuration attempts
  • Suspicious shell commands in process logs

Network Indicators:

  • Unexpected outbound connections from router
  • DNS queries to malicious domains
  • Unusual traffic patterns from router

SIEM Query:

source="router_logs" AND ("command injection" OR "shell" OR "exec" OR "system") AND hostname="*;*" OR hostname="*|*" OR hostname="*`*"

🔗 References

📤 Share & Export