Impact
The vulnerability originates from improper neutralization of special elements during the TLS‑SRP handshake, allowing an attacker to inject arbitrary SQL. The injected payload can insert known credentials directly into the device’s database, enabling the attacker to successfully perform the handshake and gain access to protected services. Because this bypasses the intended authentication mechanism, an attacker could potentially obtain privileged control over the device.
Affected Systems
The flaw affects Linksys MR9600 firmware 1.0.4.205530 and Linksys MX4200 firmware 1.0.13.210200. These specific versions are listed as vulnerable, and any systems running exactly these firmware builds are at risk.
Risk and Exploitability
The CVSS score of 9.8 classifies the issue as critical, highlighting severe potential impact. However, the EPSS score of less than 1 % indicates that, as of now, the likelihood of a real‑world exploit remains low. The vulnerability is not yet listed in CISA’s KEV catalog. Exploitation requires the ability to perform a TLS‑SRP handshake, which typically means the device is reachable over the network. The attack surface is limited to devices configured to accept SRP connections, and no public exploitation infrastructure has been reported, further reducing immediate threat.
OpenCVE Enrichment