CVE-2025-29228

Linksys E5600 V1.1.0.26 is vulnerable to command injection in the runtime.macClone function via the mc.ip parameter.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*
cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*

History

06 Jan 2026, 17:33

Type Values Removed Values Added
CPE cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*
cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*
References () https://github.com/JZP018/Vuln/blob/main/linsys/E5600/CI_macClone_mc.ip/CI_macClone_mc.ip.md - () https://github.com/JZP018/Vuln/blob/main/linsys/E5600/CI_macClone_mc.ip/CI_macClone_mc.ip.md - Broken Link
First Time Linksys e5600 Firmware
Linksys e5600
Linksys

23 Dec 2025, 19:15

Type Values Removed Values Added
CWE CWE-77
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

23 Dec 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-23 17:15

Updated : 2026-01-06 17:33


NVD link : CVE-2025-29228

Mitre link : CVE-2025-29228

CVE.ORG link : CVE-2025-29228


JSON object : View

Products Affected

linksys

  • e5600_firmware
  • e5600
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')