Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 22 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function smartConnectConfigure of the file SmartConnect.lua. Executing a manipulation of the argument configApSsid/configApPassphrase/srpLogin/srpPassword can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Linksys MR9600 SmartConnect.lua smartConnectConfigure os command injection | |
| First Time appeared |
Linksys
Linksys mr9600 Firmware |
|
| Weaknesses | CWE-77 CWE-78 |
|
| CPEs | cpe:2.3:o:linksys:mr9600_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linksys
Linksys mr9600 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-22T17:29:35.187Z
Reserved: 2026-03-21T20:47:50.172Z
Link: CVE-2026-4558
No data.
Status : Received
Published: 2026-03-22T18:16:06.023
Modified: 2026-03-22T18:16:06.023
Link: CVE-2026-4558
No data.
OpenCVE Enrichment
No data.