Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
As the Linksys E9450-SG has reached End-of-Life status, no firmware update is planned for this issue. Users and administrators of the affected product version are advised to: * Disable remote administration * Restrict router management access to trusted devices on the local network * Avoid enabling Telnet access * Consider upgrading to a model actively supported by Linksys
Fri, 19 Dec 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Successful exploitation of the vulnerability could allow an attacker with local network access to send a specially crafted URL to access certain administration functions without login credentials. | |
| Title | Bypass Authentication | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CSA
Published:
Updated: 2025-12-19T01:50:58.469Z
Reserved: 2025-06-19T06:04:41.987Z
Link: CVE-2025-52692
No data.
Status : Received
Published: 2025-12-19T02:16:05.110
Modified: 2025-12-19T02:16:05.110
Link: CVE-2025-52692
No data.
OpenCVE Enrichment
No data.
No weakness.