Cyber Posture

CVE-2026-6992

HighPublic PoCRCE

Published: 25 April 2026

Published
25 April 2026
Modified
30 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0040 60.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-6992 is a high-severity Command Injection (CWE-77) vulnerability in Linksys Mr9600 Firmware. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 39.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents OS command injection by validating and sanitizing untrusted inputs like the manipulated 'pin' argument in the JNAP Action Handler.

prevent

SI-2 ensures timely identification, reporting, and patching of flaws such as the command injection vulnerability in the router firmware.

detectrespond

RA-5 mandates vulnerability scanning to detect and remediate publicly disclosed issues like CVE-2026-6992 with available exploits.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

OS command injection in public-facing router JNAP interface enables T1190 (Exploit Public-Facing Application) for remote access and T1059.004 (Unix Shell) for arbitrary command execution on Linux-based firmware.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability was identified in Linksys MR9600 2.0.6.206937. This affects the function BTRequestGetSmartConnectStatus of the file /etc/init.d/run_central2.sh of the component JNAP Action Handler. The manipulation of the argument pin leads to os command injection. The attack may be initiated remotely.…

more

The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2026-6992 is an OS command injection vulnerability (CWE-77, CWE-78) affecting the Linksys MR9600 router on firmware version 2.0.6.206937. The issue resides in the BTRequestGetSmartConnectStatus function within the file /etc/init.d/run_central2.sh of the JNAP Action Handler component, where manipulation of the "pin" argument enables command injection.

The vulnerability is exploitable remotely over the network (AV:N) with low attack complexity (AC:L), though it requires high privileges (PR:H) and no user interaction (UI:N). Successful exploitation grants high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), corresponding to a CVSS v3.1 base score of 7.2, allowing privileged remote attackers to execute arbitrary OS commands on the device.

Advisories from sources like VulDB indicate the vendor (Linksys) was contacted early about the disclosure but provided no response or patches. An exploit is publicly available, as documented in a GitHub issue and VulDB entries, increasing the risk of active use against unpatched devices.

Details

CWE(s)

Affected Products

linksys
mr9600 firmware
2.0.6.206937

CVEs Like This One

CVE-2026-4558Same product: Linksys Mr9600
CVE-2025-8821Same vendor: Linksys
CVE-2025-8828Same vendor: Linksys
CVE-2025-9575Same vendor: Linksys
CVE-2025-8829Same vendor: Linksys
CVE-2025-29230Same vendor: Linksys
CVE-2025-29228Same vendor: Linksys
CVE-2024-57542Same vendor: Linksys
CVE-2025-9244Same vendor: Linksys
CVE-2024-57539Same vendor: Linksys

References