Filtered by vendor Linksys
Subscriptions
Filtered by product E3000
Subscriptions
Total
2 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2025-34037 | 1 Linksys | 6 E1000, E1200, E1500 and 3 more | 2025-11-22 | N/A |
| An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability is exploited in the wild by the "TheMoon" worm to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. This vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC. | ||||
| CVE-2024-48286 | 1 Linksys | 2 E3000, E3000 Firmware | 2025-06-30 | 8 High |
| Linksys E3000 1.0.06.002_US is vulnerable to command injection via the diag_ping_start function. | ||||
Page 1 of 1.