Changeflow GovPing Data Privacy & Cybersecurity Linksys MR9600 Router Vulnerability Allows Code...
Priority review Notice Added Final

Linksys MR9600 Router Vulnerability Allows Code Execution

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 22nd, 2026
Detected March 23rd, 2026
Email

Summary

CERT-Bund has issued a security advisory for the Linksys MR9600 Router, detailing a vulnerability that allows remote, authenticated attackers to execute arbitrary code. The advisory highlights a CVSS Base Score of 8.8, indicating a high severity.

What changed

CERT-Bund has issued a security advisory (WID-SEC-2026-0814) concerning a critical vulnerability in the Linksys MR9600 Router, specifically affecting firmware version 2.0.6.206937. The vulnerability, rated with a CVSS Base Score of 8.8, allows a remote, authenticated attacker to execute arbitrary code on the affected device. This poses a significant risk to both private users and small businesses that utilize this router.

While no specific mitigation is provided in the advisory, users of the Linksys MR9600 Router should be aware of this vulnerability. Given the high severity and the potential for code execution, affected users should consider updating their router firmware as soon as a patch becomes available or explore alternative security measures. The advisory does not specify a compliance deadline, but prompt action to address the vulnerability is recommended to prevent potential compromise.

What to do next

  1. Monitor for firmware updates for Linksys MR9600 Router
  2. Assess network security posture for potential compromise

Source document (simplified)

[WID-SEC-2026-0814] Linksys MR9600 Router: Schwachstelle ermöglicht Codeausführung CVSS Base Score 8.8 (hoch) CVSS Temporal Score 8.3 (hoch) Remoteangriff ja Datum 22.03.2026 Stand 23.03.2026 Mitigation nein

Betroffene Systeme

Betriebssystem

  • Sonstiges

Produktbeschreibung

Router der Firma Linksys enthalten eine Firewall und in der Regel eine WLAN-Schnittstelle. Die Geräte sind hauptsächlich für private Anwender und Kleinunternehmen konzipiert.

Produkte

22.03.2026
- Linksys Router MR9600 = 2.0.6.206937

Angriff

Angriff

Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Linksys MR9600 Router ausnutzen, um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 22nd, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0814

Who this affects

Applies to
Consumers Employers
Industry sector
4231 Wholesale Trade
Activity scope
Network Security
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Product Security Network Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.