Linksys MR9600 exposes admin credentials
CVE-2026-4558
A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function smartConnectConfigure of the file SmartConnect.lua. Executing a manipulation of the argument configApSsid/configApPassphr...
Overview
A critical security vulnerability, tracked as CVE-2026-4558, has been identified in the Linksys MR9600 dual-band Wi-Fi 6 router. This flaw is an operating system (OS) command injection vulnerability residing in the router’s web management interface. If exploited, it allows a remote attacker to execute arbitrary commands on the device with high privileges.
Vulnerability Details
The vulnerability exists in firmware version 2.0.6.206937. Specifically, it is located in the smartConnectConfigure function within the SmartConnect.lua script. This function handles configuration for the router’s Smart Connect feature, which manages band steering for Wi-Fi networks.
The flaw occurs because the software does not properly validate or sanitize user-supplied input in several parameters (configApSsid, configApPassphrase, srpLogin, srpPassword). An attacker can craft malicious input containing OS commands. When this input is processed by the vulnerable function, the embedded commands are executed by the router’s underlying operating system. The attack can be performed remotely without requiring authentication to the device.
Impact
The impact of this vulnerability is severe (CVSS score 8.8). A successful exploit could allow an attacker to:
- Gain full control of the router.
- Intercept, redirect, or modify network traffic (a man-in-the-middle attack).
- Install persistent malware or backdoors.
- Use the compromised router to launch attacks against other devices on the local network or the wider internet.
- Render the router inoperable.
An exploit for this vulnerability has been made public, significantly increasing the risk of active attacks. The vendor was contacted prior to disclosure but has not provided a response or patch at this time.
Remediation and Mitigation
Primary Action: Immediate Isolation and Monitoring As no official patch is currently available from the vendor, the following mitigation steps are critical:
- Isolate the Device: If possible, take the affected Linksys MR9600 router offline, especially if it is deployed in a sensitive or business environment.
- Restrict Access: Ensure the router’s web management interface (admin panel) is not accessible from the internet (WAN). This setting is often labeled “Remote Management” and should be disabled.
- Monitor Network Traffic: Closely monitor network logs for any unusual outbound connections or suspicious activity originating from the router’s IP address. For context on how such exploits can lead to data theft, you can review historical incidents in our breach reports.
Long-term Solution: Firmware Update Monitor the official Linksys security advisories and support page diligently for a firmware update that addresses CVE-2026-4558. Apply the patch immediately upon release. Do not rely on the auto-update feature; manually check for updates regularly.
Until a fix is provided, consider the continued use of this router in any capacity a high risk. Organizations should evaluate replacing affected devices with a model from a vendor that provides responsive security support. Stay informed on developing threats by following the latest security news.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.3, a command injection vulnerability exists in the `/config/compare/<service>/<server_ip>/...
A security flaw has been discovered in yued-fe LuLu UI up to 3.0.0. This issue affects the function child_process.exec of the file run.js. The manipulation results in os command injection. The attack ...
A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function UploadOpenVpnCert of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of...
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setRadvdCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the ar...