Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14134: Stack-based Buffer Overflow in Linksys RE6500

0
High
VulnerabilityCVE-2025-14134cvecve-2025-14134
Published: Sat Dec 06 2025 (12/06/2025, 11:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6500

Description

A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RE2000v2Repeater_get_wireless_clientlist_setClientsName of the file mod_form.so. Executing manipulation of the argument clientsname_0 can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/13/2025, 11:18:47 UTC

Technical Analysis

CVE-2025-14134 is a stack-based buffer overflow vulnerability identified in several Linksys range extender models (RE6500, RE6250, RE6300, RE6350, RE7000, RE9000) running firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the function RE2000v2Repeater_get_wireless_clientlist_setClientsName within the mod_form.so module. Specifically, the argument clientsname_0 is improperly handled, allowing an attacker to overflow the stack buffer remotely without requiring authentication or user interaction. This can lead to arbitrary code execution or device crash, compromising the device’s confidentiality, integrity, and availability. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact and ease of exploitation (network attack vector, low attack complexity, no privileges or user interaction needed). The vendor was contacted early but has not issued any patches or advisories, and a public exploit has been disclosed, increasing the likelihood of exploitation. The affected devices are commonly used in home and small office environments to extend wireless coverage, but they may also be present in enterprise edge networks. The lack of vendor response and patch availability means organizations must rely on alternative mitigations to protect their networks. The vulnerability does not require physical access and can be exploited remotely over the network, making it a significant threat to any network segment where these devices are deployed.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to complete compromise of affected Linksys range extenders, allowing attackers to execute arbitrary code, disrupt network connectivity, or pivot into internal networks. This threatens the confidentiality of sensitive communications passing through these devices, the integrity of network traffic, and the availability of network services dependent on wireless connectivity. Critical infrastructure, government agencies, and enterprises relying on these devices for network extension may face operational disruptions or data breaches. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments where these devices are exposed to untrusted networks or the internet. The absence of vendor patches exacerbates the risk, forcing organizations to consider device replacement or network architecture changes. Additionally, compromised devices could be leveraged as entry points for broader attacks, including lateral movement and persistent access within corporate or governmental networks.

Mitigation Recommendations

Given the lack of official patches, European organizations should immediately audit their networks to identify the presence of affected Linksys range extender models and firmware versions. Where possible, disable or isolate these devices from critical network segments and the internet to prevent remote exploitation. Replace vulnerable devices with updated hardware from vendors providing timely security updates. Implement network segmentation to limit the impact of any potential compromise, ensuring that these devices do not have access to sensitive internal resources. Employ strict firewall rules to restrict inbound and outbound traffic to and from these devices. Monitor network traffic for unusual activity indicative of exploitation attempts targeting the clientsname_0 parameter or related functions. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. Maintain up-to-date asset inventories and ensure that all network devices are included in vulnerability management programs. Engage with Linksys or parent company support channels to seek updates or advisories and track any future patch releases.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-05T17:07:15.702Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69340f40092893b302a4ad60

Added to database: 12/6/2025, 11:10:56 AM

Last enriched: 12/13/2025, 11:18:47 AM

Last updated: 1/20/2026, 6:24:15 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats