Description

An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability was reported to be exploited in the wild by the "TheMoon" worm  in 2014 to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. Additionally, this vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.

INFO

Published Date :

2025-06-24T01:03:27.693Z

Last Modified :

2026-04-07T14:09:11.765Z

Source :

VulnCheck
AFFECTED PRODUCTS

The following products are affected by CVE-2025-34037 vulnerability.

Vendors Products
Linksys
  • E1000
  • E1200
  • E1500
  • E2000
  • E2500
  • E3000
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-34037.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability