| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-6992 | Linksys MR9600 JNAP Action run_central2.sh BTRequestGetSmartConnectStatus os command injection | Linksys | MR9600 | High | 7.2 | 2026-04-25 18:00:20 | Deep Dive |
| CVE-2026-4558 | Linksys MR9600 SmartConnect.lua smartConnectConfigure os command injection | Linksys | MR9600 | High | 8.8 | 2026-03-22 17:29:35 | Deep Dive |
| CVE-2026-27850 | Improper verification in Linksys MR9600, Linksys MX4200 | Linksys | MR9600 | - | - | 2026-02-25 16:58:06 | Deep Dive |
| CVE-2026-27849 | Missing neutralization in Linksys MR9600, Linksys MX4200 | Linksys | MR9600 | - | - | 2026-02-25 16:20:25 | Deep Dive |
| CVE-2026-27848 | Missing neutralization in Linksys MR9600, Linksys MX4200 | Linksys | MR9600 | - | - | 2026-02-25 15:15:16 | Deep Dive |
| CVE-2026-27847 | Missing authentication in Linksys MR9600, Linksys MX4200 | Linksys | MR9600 | - | - | 2026-02-25 15:10:31 | Deep Dive |
| CVE-2026-27846 | Missing authentication in Linksys MR9600, Linksys MX4200 | Linksys | MR9600 | - | - | 2026-02-25 15:03:59 | Deep Dive |
| CVE-2026-25603 | Path Traversal vulnerability in Linksys MR9600, Linksys MX4200 | Linksys | MR9600 | - | - | 2026-02-24 17:14:36 | Deep Dive |
| CVE-2025-52692 | Bypass Authentication | Linksys | Linksys E9450-SG | High | 8.8 | 2025-12-19 01:50:58 | Deep Dive |
| CVE-2025-14136 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so stack-based overflow | Linksys | RE6500 | High | 8.8 | 2025-12-06 13:02:06 | Deep Dive |
| CVE-2025-14135 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so AP_get_wired_clientlist_setClientsName stack-based overflow | Linksys | RE6500 | High | 8.8 | 2025-12-06 11:32:07 | Deep Dive |
| CVE-2025-14134 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so stack-based overflow | Linksys | RE6500 | High | 8.8 | 2025-12-06 11:02:07 | Deep Dive |
| CVE-2025-14133 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so AP_get_wireless_clientlist_setClientsName stack-based overflow | Linksys | RE6500 | High | 8.8 | 2025-12-06 10:32:05 | Deep Dive |
| CVE-2025-9575 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 upload.cgi cgiMain os command injection | Linksys | RE6250 | Medium | 6.3 | 2025-08-28 18:02:06 | Deep Dive |
| CVE-2025-9528 | Linksys E1700 systemCommand os command injection | Linksys | E1700 | Medium | 4.7 | 2025-08-27 13:02:09 | Deep Dive |
| CVE-2025-9527 | Linksys E1700 QoSSetup stack-based overflow | Linksys | E1700 | High | 8.8 | 2025-08-27 13:02:06 | Deep Dive |
| CVE-2025-9526 | Linksys E1700 setSysAdm stack-based overflow | Linksys | E1700 | High | 8.8 | 2025-08-27 12:32:09 | Deep Dive |
| CVE-2025-9525 | Linksys E1700 setWan stack-based overflow | Linksys | E1700 | High | 8.8 | 2025-08-27 12:32:07 | Deep Dive |
| CVE-2025-9483 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 singlePortForwardAdd stack-based overflow | Linksys | RE6250 | High | 8.8 | 2025-08-26 14:02:06 | Deep Dive |
| CVE-2025-9482 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 portRangeForwardAdd stack-based overflow | Linksys | RE6250 | High | 8.8 | 2025-08-26 13:32:12 | Deep Dive |