First published: Fri Mar 21 2025(Updated: )
In Linksys E5600 V1.1.0.26, the \usr\share\lua\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt["count"] parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys E5600 Firmware | ||
All of | ||
Linksys E5600 Firmware | =1.1.0.26 | |
Linksys E5600 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-29226 is classified as a high severity vulnerability due to the potential for command injection.
To fix CVE-2025-29226, update the Linksys E5600 router to the latest firmware version provided by the vendor.
The impact of CVE-2025-29226 allows an attacker to execute arbitrary commands on the device, potentially leading to system compromise.
CVE-2025-29226 affects the Linksys E5600 router running firmware version 1.1.0.26.
As of now, there have been no confirmed reports of active exploitation of CVE-2025-29226 in the wild.