Description
An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability was reported to be exploited in the wild by the "TheMoon" worm in 2014 to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. Additionally, this vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.
INFO
Published Date :
2025-06-24T01:03:27.693Z
Last Modified :
2026-04-07T14:09:11.765Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2025-34037 vulnerability.
| Vendors | Products |
|---|---|
| Linksys |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-34037.