ID

VAR-202511-0870


CVE

CVE-2025-60693


DESCRIPTION

A stack-based buffer overflow exists in the get_merge_mac function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to six user-supplied CGI parameters matching <parameter>_0~5 into a fixed-size buffer (a2) without proper bounds checking, appending colon delimiters during concatenation. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication.

Trust: 1.0

sources: NVD: CVE-2025-60693

AFFECTED PRODUCTS

vendor:linksysmodel:e1200scope:eqversion:2.0.11.001

Trust: 1.0

sources: NVD: CVE-2025-60693

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-60693
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-60693
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 2.5
version: 3.1

Trust: 1.0

sources: NVD: CVE-2025-60693

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

sources: NVD: CVE-2025-60693

EXTERNAL IDS

db:NVDid:CVE-2025-60693

Trust: 1.0

sources: NVD: CVE-2025-60693

REFERENCES

url:http://linksys.com

Trust: 1.0

url:https://www.linksys.com/

Trust: 1.0

url:https://github.com/yifan20020708/sgtaint-0-day/blob/main/linksys/linksys-e1200/cve-2025-60693.md

Trust: 1.0

sources: NVD: CVE-2025-60693

SOURCES

db:NVDid:CVE-2025-60693

LAST UPDATE DATE

2025-11-19T23:32:08.813000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2025-60693date:2025-11-17T19:55:48.760

SOURCES RELEASE DATE

db:NVDid:CVE-2025-60693date:2025-11-13T18:15:53.040