Linksys RE Router Vulnerability

HIGH (8.8)

Threat Intelligence

Low Risk
EPSS Score: 0.08% chance of exploitation (percentile: 25%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The Linksys RE series is a line of wireless routers manufactured by Linksys. This vulnerability affects the RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000 models, which use the mod_form.so file to manage wireless clients. The vulnerability allows an attacker to execute arbitrary code on the router by manipulating the "clientsname_0" argument in the RE2000v2Repeater_getWireless_clientlist_setClientsName function.

Am I affected?

You're affected if you use A vulnerability was determined. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

How to fix

To fix this vulnerability, you can:

  1. Upgrade to a patched firmware version (version 1.0.04.002 or later) from the Linksys website.
  2. Immediately apply mitigations:
    • Restrict network access to your router (firewall it from the public internet)
    • Audit admin account activity for suspicious access patterns
    • Monitor for unauthorized token creation