Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
As the Linksys E9450-SG has reached End-of-Life status, no firmware update is planned for this issue. Users and administrators of the affected product version are advised to: * Disable remote administration * Restrict router management access to trusted devices on the local network * Avoid enabling Telnet access * Consider upgrading to a model actively supported by Linksys
Tue, 23 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linksys e9450-sg Firmware
|
|
| CPEs | cpe:2.3:h:linksys:e9450-sg:-:*:*:*:*:*:*:* cpe:2.3:o:linksys:e9450-sg_firmware:1.2.00.052:*:*:*:*:*:*:* |
|
| Vendors & Products |
Linksys e9450-sg Firmware
|
Fri, 19 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-306 | |
| Metrics |
ssvc
|
Fri, 19 Dec 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linksys
Linksys e9450-sg |
|
| Vendors & Products |
Linksys
Linksys e9450-sg |
Fri, 19 Dec 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Successful exploitation of the vulnerability could allow an attacker with local network access to send a specially crafted URL to access certain administration functions without login credentials. | |
| Title | Bypass Authentication | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CSA
Published:
Updated: 2025-12-19T15:37:36.970Z
Reserved: 2025-06-19T06:04:41.987Z
Link: CVE-2025-52692
Updated: 2025-12-19T15:37:33.196Z
Status : Analyzed
Published: 2025-12-19T02:16:05.110
Modified: 2025-12-23T19:13:14.557
Link: CVE-2025-52692
No data.
OpenCVE Enrichment
Updated: 2025-12-19T09:15:29Z