CVE-2025-14134: Stack-based Buffer Overflow in Linksys RE6500
A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RE2000v2Repeater_get_wireless_clientlist_setClientsName of the file mod_form.so. Executing manipulation of the argument clientsname_0 can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14134 is a stack-based buffer overflow vulnerability identified in several Linksys range extender models (RE6500, RE6250, RE6300, RE6350, RE7000, RE9000) running firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the function RE2000v2Repeater_get_wireless_clientlist_setClientsName within the mod_form.so module. Specifically, the argument clientsname_0 is improperly handled, allowing an attacker to overflow the stack buffer remotely without requiring authentication or user interaction. This can lead to arbitrary code execution or device crash, compromising the device’s confidentiality, integrity, and availability. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact and ease of exploitation (network attack vector, low attack complexity, no privileges or user interaction needed). The vendor was contacted early but has not issued any patches or advisories, and a public exploit has been disclosed, increasing the likelihood of exploitation. The affected devices are commonly used in home and small office environments to extend wireless coverage, but they may also be present in enterprise edge networks. The lack of vendor response and patch availability means organizations must rely on alternative mitigations to protect their networks. The vulnerability does not require physical access and can be exploited remotely over the network, making it a significant threat to any network segment where these devices are deployed.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to complete compromise of affected Linksys range extenders, allowing attackers to execute arbitrary code, disrupt network connectivity, or pivot into internal networks. This threatens the confidentiality of sensitive communications passing through these devices, the integrity of network traffic, and the availability of network services dependent on wireless connectivity. Critical infrastructure, government agencies, and enterprises relying on these devices for network extension may face operational disruptions or data breaches. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments where these devices are exposed to untrusted networks or the internet. The absence of vendor patches exacerbates the risk, forcing organizations to consider device replacement or network architecture changes. Additionally, compromised devices could be leveraged as entry points for broader attacks, including lateral movement and persistent access within corporate or governmental networks.
Mitigation Recommendations
Given the lack of official patches, European organizations should immediately audit their networks to identify the presence of affected Linksys range extender models and firmware versions. Where possible, disable or isolate these devices from critical network segments and the internet to prevent remote exploitation. Replace vulnerable devices with updated hardware from vendors providing timely security updates. Implement network segmentation to limit the impact of any potential compromise, ensuring that these devices do not have access to sensitive internal resources. Employ strict firewall rules to restrict inbound and outbound traffic to and from these devices. Monitor network traffic for unusual activity indicative of exploitation attempts targeting the clientsname_0 parameter or related functions. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. Maintain up-to-date asset inventories and ensure that all network devices are included in vulnerability management programs. Engage with Linksys or parent company support channels to seek updates or advisories and track any future patch releases.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-14134: Stack-based Buffer Overflow in Linksys RE6500
Description
A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RE2000v2Repeater_get_wireless_clientlist_setClientsName of the file mod_form.so. Executing manipulation of the argument clientsname_0 can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14134 is a stack-based buffer overflow vulnerability identified in several Linksys range extender models (RE6500, RE6250, RE6300, RE6350, RE7000, RE9000) running firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the function RE2000v2Repeater_get_wireless_clientlist_setClientsName within the mod_form.so module. Specifically, the argument clientsname_0 is improperly handled, allowing an attacker to overflow the stack buffer remotely without requiring authentication or user interaction. This can lead to arbitrary code execution or device crash, compromising the device’s confidentiality, integrity, and availability. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact and ease of exploitation (network attack vector, low attack complexity, no privileges or user interaction needed). The vendor was contacted early but has not issued any patches or advisories, and a public exploit has been disclosed, increasing the likelihood of exploitation. The affected devices are commonly used in home and small office environments to extend wireless coverage, but they may also be present in enterprise edge networks. The lack of vendor response and patch availability means organizations must rely on alternative mitigations to protect their networks. The vulnerability does not require physical access and can be exploited remotely over the network, making it a significant threat to any network segment where these devices are deployed.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to complete compromise of affected Linksys range extenders, allowing attackers to execute arbitrary code, disrupt network connectivity, or pivot into internal networks. This threatens the confidentiality of sensitive communications passing through these devices, the integrity of network traffic, and the availability of network services dependent on wireless connectivity. Critical infrastructure, government agencies, and enterprises relying on these devices for network extension may face operational disruptions or data breaches. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments where these devices are exposed to untrusted networks or the internet. The absence of vendor patches exacerbates the risk, forcing organizations to consider device replacement or network architecture changes. Additionally, compromised devices could be leveraged as entry points for broader attacks, including lateral movement and persistent access within corporate or governmental networks.
Mitigation Recommendations
Given the lack of official patches, European organizations should immediately audit their networks to identify the presence of affected Linksys range extender models and firmware versions. Where possible, disable or isolate these devices from critical network segments and the internet to prevent remote exploitation. Replace vulnerable devices with updated hardware from vendors providing timely security updates. Implement network segmentation to limit the impact of any potential compromise, ensuring that these devices do not have access to sensitive internal resources. Employ strict firewall rules to restrict inbound and outbound traffic to and from these devices. Monitor network traffic for unusual activity indicative of exploitation attempts targeting the clientsname_0 parameter or related functions. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. Maintain up-to-date asset inventories and ensure that all network devices are included in vulnerability management programs. Engage with Linksys or parent company support channels to seek updates or advisories and track any future patch releases.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-05T17:07:15.702Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69340f40092893b302a4ad60
Added to database: 12/6/2025, 11:10:56 AM
Last enriched: 12/13/2025, 11:18:47 AM
Last updated: 1/20/2026, 6:24:15 PM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67263: n/a
HighCVE-2025-33231: CWE-427 Uncontrolled Search Path Element in NVIDIA CUDA Toolkit
MediumCVE-2025-33230: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA CUDA Toolkit
HighCVE-2025-67261: n/a
HighCVE-2025-55423: n/a
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.