CVE-2025-34037

EXPLOITED

Linksys E-Series - Command Injection

Title source: llm

Description

An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability is exploited in the wild by the "TheMoon" worm to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. This vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Rew · phpremotehardware
https://www.exploit-db.com/exploits/31683
metasploit WORKING POC EXCELLENT
by Johannes Ullrich, Rew, infodox · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/linksys_themoon_exec.rb

Scores

EPSS 0.7962
EPSS Percentile 99.1%

Exploitation Intel

VulnCheck KEV 2025-06-23

Classification

CWE
CWE-78
Status draft

Timeline

Published Jun 24, 2025
Tracked Since Feb 18, 2026