Impact
The vulnerability is an OS command injection flaw in the smartConnectConfigure function of SmartConnect.lua. By manipulating the configuration parameters configApSsid, configApPassphrase, srpLogin, or srpPassword a remote attacker can execute arbitrary operating‑system commands, compromising confidentiality, integrity, and availability of the device. This is an instance of CWE-77 and CWE-78 weaknesses.
Affected Systems
Linksys MR9600 routers running firmware version 2.0.6.206937 are affected.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity. No EPSS score is reported, and the vulnerability is not listed in the KEV catalog. An exploit has already been published and can be triggered remotely without local authentication. Based on the description, the likely attack vector is a remote HTTP or web service request that passes malicious input to the SmartConnect configuration endpoint. The risk remains substantial if the device is exposed to untrusted networks.
OpenCVE Enrichment