CVE-2020-35713

Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell...

Basic Information

CVE State
PUBLISHED
Reserved Date
December 26, 2020
Published Date
December 26, 2020
Last Updated
August 04, 2024
Vendor
Belkin
Product
LINKSYS RE6500
Description
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
Tags
edge nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS Score

Score
91.81% (Percentile: 99.66%) as of 2025-06-14

Exploit Status

Exploited in the Wild
Yes (2025-05-27 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-28 12:00:34 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

Al1ex/CVE-2020-35713

Type: github • Created: 2021-01-21 06:39:58 UTC • Stars: 1

CVE-2020-35713

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel