Linksys MR9600 Router Vulnerability Allows Code Execution
Summary
CERT-Bund has issued a security advisory for the Linksys MR9600 Router, detailing a vulnerability that allows remote, authenticated attackers to execute arbitrary code. The advisory highlights a CVSS Base Score of 8.8, indicating a high severity.
What changed
CERT-Bund has issued a security advisory (WID-SEC-2026-0814) concerning a critical vulnerability in the Linksys MR9600 Router, specifically affecting firmware version 2.0.6.206937. The vulnerability, rated with a CVSS Base Score of 8.8, allows a remote, authenticated attacker to execute arbitrary code on the affected device. This poses a significant risk to both private users and small businesses that utilize this router.
While no specific mitigation is provided in the advisory, users of the Linksys MR9600 Router should be aware of this vulnerability. Given the high severity and the potential for code execution, affected users should consider updating their router firmware as soon as a patch becomes available or explore alternative security measures. The advisory does not specify a compliance deadline, but prompt action to address the vulnerability is recommended to prevent potential compromise.
What to do next
- Monitor for firmware updates for Linksys MR9600 Router
- Assess network security posture for potential compromise
Source document (simplified)
[WID-SEC-2026-0814] Linksys MR9600 Router: Schwachstelle ermöglicht Codeausführung CVSS Base Score 8.8 (hoch) CVSS Temporal Score 8.3 (hoch) Remoteangriff ja Datum 22.03.2026 Stand 23.03.2026 Mitigation nein
Betroffene Systeme
Betriebssystem
- Sonstiges
Produktbeschreibung
Router der Firma Linksys enthalten eine Firewall und in der Regel eine WLAN-Schnittstelle. Die Geräte sind hauptsächlich für private Anwender und Kleinunternehmen konzipiert.
Produkte
22.03.2026
- Linksys Router MR9600 = 2.0.6.206937
Angriff
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Linksys MR9600 Router ausnutzen, um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.