CVE-2025-34037
Linksys Routers E/WAG/WAP/WES/WET/WRT-Series
An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability was reported to be exploited in the wild by the "TheMoon" worm in 2014 to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. Additionally, this vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.
| CWE | CWE-78 |
| Vendor | linksys |
| Product | e4200 |
| Published | Jun 24, 2025 |
| Last Updated | Apr 7, 2026 |
Get instant alerts for linksys e4200
Be the first to know when new unknown vulnerabilities affecting linksys e4200 are published — delivered to Slack, Telegram or Discord.