Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 27 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linksys mr9600
|
|
| Vendors & Products |
Linksys mr9600
|
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 25 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in Linksys MR9600 2.0.6.206937. This affects the function BTRequestGetSmartConnectStatus of the file /etc/init.d/run_central2.sh of the component JNAP Action Handler. The manipulation of the argument pin leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Linksys MR9600 JNAP Action run_central2.sh BTRequestGetSmartConnectStatus os command injection | |
| First Time appeared |
Linksys
Linksys mr9600 Firmware |
|
| Weaknesses | CWE-77 CWE-78 |
|
| CPEs | cpe:2.3:o:linksys:mr9600_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linksys
Linksys mr9600 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-27T13:34:09.962Z
Reserved: 2026-04-24T19:39:58.219Z
Link: CVE-2026-6992
Updated: 2026-04-27T13:10:56.743Z
Status : Awaiting Analysis
Published: 2026-04-25T18:16:19.413
Modified: 2026-04-27T18:57:20.293
Link: CVE-2026-6992
No data.
OpenCVE Enrichment
Updated: 2026-04-27T18:45:11Z