Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 17 Nov 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:h:linksys:e1200:2:*:*:*:*:*:*:* cpe:2.3:o:linksys:e1200_firmware:2.0.11.001:*:*:*:*:*:*:* |
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linksys
Linksys e1200 Linksys e1200 Firmware |
|
| Vendors & Products |
Linksys
Linksys e1200 Linksys e1200 Firmware |
Thu, 13 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Thu, 13 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow exists in the validate_static_route function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function improperly concatenates user-supplied CGI parameters (route_ipaddr_0~3, route_netmask_0~3, route_gateway_0~3) into fixed-size buffers (v6, v10, v14) without proper bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-13T17:14:42.050Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60694
Updated: 2025-11-13T17:14:37.184Z
Status : Analyzed
Published: 2025-11-13T17:15:49.373
Modified: 2025-11-17T19:55:35.850
Link: CVE-2025-60694
No data.
OpenCVE Enrichment
Updated: 2025-11-14T09:28:11Z