Skip to content
CVSS 7.2 · HIGH

CVE-2026-6992

A vulnerability was identified in Linksys MR9600 2.0.6.206937. This affects the function BTRequestGetSmartConnectStatus of the file /etc/init.d/run_central2.sh of the component JNAP Action Handler. The manipulation of the argument pin leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Ver en NVD

Análisis

This is a vendor-specific firmware vulnerability for a consumer-grade Linksys router. It does not affect the common software development stack, server infrastructure, or development tooling used by the community.

Severidad

Puntaje: 7.2(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: HIGH
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-77CWE-78

EPSS

Probabilidad de explotación (próx. 30 días): 0.0040 (0.4%)
Percentil: 60.7%
EPSS: 2026-05-06

Afecta

linksys:mr9600_firmwarelinksys:mr9600

Descripción técnica

A vulnerability was identified in Linksys MR9600 2.0.6.206937. This affects the function BTRequestGetSmartConnectStatus of the file /etc/init.d/run_central2.sh of the component JNAP Action Handler. The manipulation of the argument pin leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Publicada: 25/4/2026, 18:16:19
Última modificación: 30/4/2026, 14:09:56

Referencias

InicioEventosBlogRecursosEquipo