CVE-2025-5445
📋 TL;DR
This critical vulnerability in Linksys RE series range extenders allows remote attackers to execute arbitrary operating system commands via command injection in the RP_checkFWByBBS function. Attackers can exploit this to gain full control of affected devices. All users of vulnerable Linksys RE series range extenders with specified firmware versions are affected.
💻 Affected Systems
- Linksys RE6500
- Linksys RE6250
- Linksys RE6300
- Linksys RE6350
- Linksys RE7000
- Linksys RE9000
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to install persistent malware, pivot to internal networks, intercept network traffic, or use device as botnet node.
Likely Case
Device takeover leading to network disruption, credential theft, or use in DDoS attacks.
If Mitigated
Limited impact if devices are isolated in separate VLANs with strict network segmentation and egress filtering.
🎯 Exploit Status
Exploit code is publicly available on GitHub. Attack requires network access to device web interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.linksys.com/
Restart Required: Yes
Instructions:
1. Check Linksys website for firmware updates. 2. If update available, download and install via web interface. 3. Reboot device after update. 4. Verify firmware version is no longer vulnerable.
🔧 Temporary Workarounds
Network Isolation
allPlace vulnerable devices in isolated VLAN with no internet access and strict firewall rules.
Access Control
linuxBlock external access to device web interface using firewall rules.
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Replace vulnerable devices with supported models
- Disable web interface entirely if not needed for operation
🔍 How to Verify
Check if Vulnerable:
Access device web interface, navigate to Administration > Firmware Upgrade page, check current firmware version against vulnerable list.
Check Version:
curl -s http://device-ip/ | grep -i firmware
Verify Fix Applied:
After firmware update, verify version is higher than vulnerable versions listed.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /goform/RP_checkFWByBBS
- Suspicious command execution in system logs
- Multiple failed login attempts
Network Indicators:
- Unusual outbound connections from range extender
- Traffic to known malicious IPs
- Port scanning originating from device
SIEM Query:
source="linksys-extender" AND (uri="/goform/RP_checkFWByBBS" OR cmd="*;*" OR cmd="*|*")