Impact
This vulnerability arises from a missing neutralization of special elements in the TLS‑SRP handshake implementation. The flaw allows an attacker to inject arbitrary operating‑system commands that are subsequently executed with root privileges on the device. Because the commands run as root, the attacker could take full control of the device, compromise network traffic, or install persistent malware. The weakness is identified by CWE‑78, a classic example of command‑injection.
Affected Systems
Linksys MR9600 firmware version 1.0.4.205530 and Linksys MX4200 firmware version 1.0.13.210200 are listed as vulnerable. These devices are consumer‑grade routers used in home or small‑office environments; the firmware versions are the only ones mentioned as affected.
Risk and Exploitability
The CVSS score of 9.8 signals critical severity, and while the EPSS score is below 1 % indicating a low probability of exploitation, the flaw is reachable over the network and the description does not explicitly state whether authentication is required, so this remains uncertain. The vulnerability is not currently catalogued in CISA’s KEV list, but its remote command execution capability means it is a high‑risk finding for any network that can reach the affected routers.
OpenCVE Enrichment