Submit #797086: Linksys MR9600 Firmware 2.0.6.206937 Command Injectioninfo

TitelLinksys MR9600 Firmware 2.0.6.206937 Command Injection
BeschreibungAn authenticated OS command injection vulnerability exists in Linksys MR9600 firmware 2.0.6.206937. The issue is reachable through the JNAP action BTRequestGetSmartConnectStatus. The user-controlled `pin` parameter is passed into `bluetooth.btGetSmartConnectStatus2(pin)`, then concatenated into `/etc/init.d/run_central2.sh`, where it is ultimately used in `/usr/bin/btsetup_central $OPTION` without proper quoting. This allows an authenticated attacker to inject arbitrary shell commands and achieve root command execution. The vulnerable code path requires the device to be in Master mode.
Quelle⚠️ https://github.com/utmost3/cve/issues/2
Benutzer
 wuuu (UID 93536)
Einreichung04.04.2026 12:37 (vor 22 Tagen)
Moderieren24.04.2026 21:40 (20 days later)
StatusAkzeptiert
VulDB Eintrag359544 [Linksys MR9600 2.0.6.206937 JNAP Action run_central2.sh BTRequestGetSmartConnectStatus pin erweiterte Rechte]
Punkte20

Do you need the next level of professionalism?

Upgrade your account now!