Vulnerability Description
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.ddnsStatus DynDNS function via the username parameter.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linksys | E5600 Firmware | 1.1.0.26 |
| Linksys | E5600 | - |
Related Weaknesses (CWE)
References
- https://github.com/JZP018/vuln03/blob/main/linksys/E5600/CI_ddnsStatus_DynDNS_usExploit
- https://github.com/JZP018/vuln03/blob/main/linksys/E5600/CI_ddnsStatus_DynDNS_usProduct
- https://github.com/JZP018/vuln03/blob/main/linksys/E5600/CI_ddnsStatus_DynDNS_usExploit
FAQ
What is CVE-2025-45491?
CVE-2025-45491 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.ddnsStatus DynDNS function via the username parameter.
How severe is CVE-2025-45491?
CVE-2025-45491 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-45491?
Check the references section above for vendor advisories and patch information. Affected products include: Linksys E5600 Firmware, Linksys E5600.