Description
Due to missing neutralization of special elements, OS commands can be injected via the update functionality of a TLS-SRP connection, which is normally used for configuring devices inside the mesh network.
This issue affects MR9600: 1.0.4.205530; MX4200: 1.0.13.210200.
Published: 2026-02-25
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Command Injection Leading to Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Os commands can be injected through the update functionality of a TLS‑SRP connection because special elements are not neutralized. This flaw enables attackers to execute arbitrary system commands on the affected device, providing full control over the device’s operating system. The high CVSS score of 9.8 reflects the severity and the ability to compromise confidentiality, integrity, and availability of the network.

Affected Systems

Linksys MR9600 version 1.0.4.205530 and Linksys MX4200 version 1.0.13.210200 are the specific models and firmware releases affected. These devices are used to configure routers and mesh networks and therefore are pivotal to network operation.

Risk and Exploitability

The CVSS score of 9.8 indicates a critical risk, while the EPSS score of less than 1 % suggests that current exploitation attempts are low but still possible. The vulnerability is not listed in the CISA KEV catalog, but the remote nature of the attack vector—via a TLS‑SRP update channel—could let an attacker with network access perform the injection. The flaw permits unattended code execution, making it a high‑impact threat to any system incorporating the listed firmware.

Generated by OpenCVE AI on April 17, 2026 at 15:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update released by Linksys to both the MR9600 and MX4200 devices.
  • Disable or block the TLS‑SRP update path on affected devices to mitigate the risk while a patch is applied.
  • Implement network segmentation or firewall policies that isolate the firmware update traffic from critical infrastructure components.
  • Monitor device logs for anomalous command execution or other signs of compromise and respond promptly.

Generated by OpenCVE AI on April 17, 2026 at 15:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 05:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 26 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Linksys
Linksys mr9600
Linksys mx4200
Vendors & Products Linksys
Linksys mr9600
Linksys mx4200

Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description Due to missing neutralization of special elements, OS commands can be injected via the update functionality of a TLS-SRP connection, which is normally used for configuring devices inside the mesh network. This issue affects MR9600: 1.0.4.205530; MX4200: 1.0.13.210200.
Title Missing neutralization in Linksys MR9600, Linksys MX4200
Weaknesses CWE-78
References

cve-icon MITRE

Status: PUBLISHED

Assigner: ENISA

Published:

Updated: 2026-02-26T16:47:01.147Z

Reserved: 2026-02-24T07:07:48.974Z

Link: CVE-2026-27849

cve-icon Vulnrichment

Updated: 2026-02-26T16:38:25.216Z

cve-icon NVD

Status : Deferred

Published: 2026-02-25T17:25:40.903

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-27849

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:15:21Z

Weaknesses