Skip to content
CVSS 7.2 · HIGH

CVE-2026-6992

A vulnerability was identified in Linksys MR9600 2.0.6.206937. This affects the function BTRequestGetSmartConnectStatus of the file /etc/init.d/run_central2.sh of the component JNAP Action Handler. The manipulation of the argument pin leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

View on NVD

Analysis

This is a vendor-specific firmware vulnerability for a consumer-grade Linksys router. It does not affect the common software development stack, server infrastructure, or development tooling used by the community.

Severity

Score: 7.2(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: HIGH
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-77CWE-78

EPSS

Probability of exploitation (next 30 days): 0.0040 (0.4%)
Percentile: 60.7%
EPSS: 2026-05-06

Affects

linksys:mr9600_firmwarelinksys:mr9600

Technical description

A vulnerability was identified in Linksys MR9600 2.0.6.206937. This affects the function BTRequestGetSmartConnectStatus of the file /etc/init.d/run_central2.sh of the component JNAP Action Handler. The manipulation of the argument pin leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Published: 4/25/2026, 6:16:19 PM
Last modified: 4/30/2026, 2:09:56 PM

References

HomeEventsBlogResourcesTeam