CVE-2025-60694

7.5 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Linksys E1200 v2 routers allows remote attackers to execute arbitrary code or cause denial of service without authentication. Attackers can exploit this by sending specially crafted HTTP requests to the router's web interface. This affects all users of Linksys E1200 v2 routers running vulnerable firmware.

💻 Affected Systems

Products:
  • Linksys E1200 v2
Versions: Firmware E1200_v2.0.11.001_us.tar.gz and likely earlier versions
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: The web interface is typically enabled by default on these routers, making them immediately vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete router compromise, credential theft, network traffic interception, and persistent backdoor installation.

🟠

Likely Case

Router crash causing denial of service, requiring physical reset and disrupting network connectivity.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted web interface access, though still vulnerable to internal threats.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making weaponization straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.linksys.com/

Restart Required: Yes

Instructions:

1. Check Linksys website for firmware updates. 2. Download latest firmware for E1200 v2. 3. Log into router web interface. 4. Navigate to firmware update section. 5. Upload and install new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Restrict Web Interface Access

linux

Use firewall rules to limit access to router management interface

iptables -A INPUT -p tcp --dport 80 -s 192.168.1.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Replace router with supported model
  • Place router behind dedicated firewall with strict inbound rules

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under Administration > Firmware Upgrade

Check Version:

curl -s http://router-ip/status.cgi | grep firmware

Verify Fix Applied:

Verify firmware version is newer than E1200_v2.0.11.001_us

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with unusual CGI parameters (route_ipaddr_, route_netmask_, route_gateway_)
  • Router crash/reboot events in system logs

Network Indicators:

  • HTTP POST requests to router IP with buffer overflow patterns in parameters
  • Unusual outbound connections from router after exploitation

SIEM Query:

source="router.log" AND ("route_ipaddr_" OR "route_netmask_" OR "route_gateway_")

🔗 References

📤 Share & Export