CVE-2025-5439

6.3 MEDIUM

📋 TL;DR

A critical OS command injection vulnerability in Linksys RE series WiFi extenders allows remote attackers to execute arbitrary commands on affected devices. The vulnerability exists in the verifyFacebookLike function and can be exploited by manipulating uid or accessToken parameters. All users of affected Linksys RE models with vulnerable firmware versions are at risk.

💻 Affected Systems

Products:
  • Linksys RE6500
  • Linksys RE6250
  • Linksys RE6300
  • Linksys RE6350
  • Linksys RE7000
  • Linksys RE9000
Versions: 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, 1.2.07.001
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable by default. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent backdoors, pivot to internal networks, or use device as part of botnet.

🟠

Likely Case

Remote code execution leading to device takeover, credential theft, or denial of service.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Attack can be launched remotely without authentication, making internet-facing devices immediate targets.
🏢 Internal Only: MEDIUM - Internal devices still vulnerable to internal attackers or compromised hosts on same network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on GitHub. Attack requires no authentication and uses simple HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.linksys.com/

Restart Required: Yes

Instructions:

1. Check Linksys website for firmware updates. 2. If update available, download and install via web interface. 3. Reboot device after update. 4. Verify firmware version is no longer vulnerable.

🔧 Temporary Workarounds

Network Isolation

all

Place affected devices on isolated VLAN with no internet access and strict firewall rules.

Access Control

linux

Block external access to device web interface (port 80/443) via firewall.

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Replace vulnerable devices with different models or brands
  • Disable affected devices entirely until patch available

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface at http://[device-ip]/ or using admin interface.

Check Version:

curl -s http://[device-ip]/ | grep -i firmware || Check web interface manually

Verify Fix Applied:

Verify firmware version is newer than affected versions listed above.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/verifyFacebookLike
  • Suspicious command execution in system logs
  • Multiple failed authentication attempts

Network Indicators:

  • HTTP requests to /goform/verifyFacebookLike with shell metacharacters in parameters
  • Outbound connections from extender to unknown IPs

SIEM Query:

source="extender_logs" AND (uri="/goform/verifyFacebookLike" OR cmd="*sh*" OR process="*bash*")

🔗 References

📤 Share & Export