Linksys MR9600 Command Injection Vulnerability (CVE-2026-6992)
CVE-2026-6992 is a command injection vulnerability in the Linksys MR9600 router that allows remote attackers to execute arbitrary OS commands by manipulating the 'pin' argument in the BTRequestGetSmartConnectStatus function.
A command injection vulnerability, CVE-2026-6992, affects the Linksys MR9600 router, specifically version 2.0.6.206937. The vulnerability resides in the JNAP Action Handler component within the /etc/init.d/run_central2.sh script. Attackers can remotely exploit this flaw by manipulating the pin argument passed to the BTRequestGetSmartConnectStatus function. This allows for the execution of arbitrary operating system commands on the affected device. A public exploit is available, increasing the risk of exploitation. The vendor was notified but did not respond.
Attack Chain
- The attacker sends a crafted HTTP request to the Linksys MR9600 router.
- The request targets the JNAP Action Handler component, specifically the
/etc/init.d/run_central2.shscript. - The
BTRequestGetSmartConnectStatusfunction is invoked by the crafted request. - The attacker injects malicious OS commands within the
pinargument of theBTRequestGetSmartConnectStatusfunction. - The router’s firmware processes the request, failing to properly sanitize the
pinargument. - The injected OS commands are executed with the privileges of the running process, potentially
root. - The attacker gains control of the router, potentially allowing for further malicious activities, such as network traffic interception or modification of router settings.
Impact
Successful exploitation of CVE-2026-6992 allows a remote attacker to execute arbitrary commands on the Linksys MR9600 router. This can lead to a complete compromise of the device, allowing the attacker to monitor network traffic, change router configurations, or use the router as a foothold for further attacks within the network. Given the availability of a public exploit, the risk of widespread exploitation is high.
Recommendation
- Deploy the Sigma rule
Detect CVE-2026-6992 Exploitation Attemptto identify exploitation attempts in web server logs. - Apply the Sigma rule
Detect Suspicious Shell Activity via Web Requestto detect potential command injection attempts. - Monitor web server logs for requests containing suspicious characters in the
cs-uri-queryfield that target/etc/init.d/run_central2.shto uncover exploitation attempts.
Detection coverage 2
Detect CVE-2026-6992 Exploitation Attempt
criticalDetects attempts to exploit CVE-2026-6992 by looking for requests to the vulnerable script with command injection patterns.
Detect Suspicious Shell Activity via Web Request
highDetects suspicious shell activity in web requests, indicating potential command injection.
Detection queries are kept inside the platform. Get full rules →