Successful exploitation of the vulnerability could allow an attacker with local network access to send a specially crafted URL to access certain administration functions without login credentials.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

As the Linksys E9450-SG has reached End-of-Life status, no firmware update is planned for this issue. Users and administrators of the affected product version are advised to: * Disable remote administration * Restrict router management access to trusted devices on the local network * Avoid enabling Telnet access * Consider upgrading to a model actively supported by Linksys

History

Fri, 19 Dec 2025 02:15:00 +0000

Type Values Removed Values Added
Description Successful exploitation of the vulnerability could allow an attacker with local network access to send a specially crafted URL to access certain administration functions without login credentials.
Title Bypass Authentication
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CSA

Published:

Updated: 2025-12-19T01:50:58.469Z

Reserved: 2025-06-19T06:04:41.987Z

Link: CVE-2025-52692

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-19T02:16:05.110

Modified: 2025-12-19T02:16:05.110

Link: CVE-2025-52692

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses

No weakness.