Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8817: Stack-based Buffer Overflow in Linksys RE6250

0
High
VulnerabilityCVE-2025-8817cvecve-2025-8817
Published: Sun Aug 10 2025 (08/10/2025, 22:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6250

Description

A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected by this vulnerability is the function setLan of the file /goform/setLan. The manipulation of the argument lan2enabled leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/18/2025, 01:06:06 UTC

Technical Analysis

CVE-2025-8817 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically those running firmware versions up to 20250801. The vulnerability resides in the setLan function within the /goform/setLan endpoint, where improper handling of the 'lan2enabled' argument allows an attacker to overflow the stack buffer. This flaw can be exploited remotely without requiring user interaction or prior authentication, making it highly accessible to attackers. The buffer overflow can lead to arbitrary code execution, potentially allowing attackers to take full control of the affected device, disrupt network operations, or pivot into internal networks. The vulnerability has been publicly disclosed, and although no known exploits are currently observed in the wild, the availability of a public exploit increases the risk of exploitation. The vendor, Linksys, has not responded to early disclosure attempts, and no patches or mitigations have been officially released as of the publication date. The CVSS 4.0 base score of 8.7 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges or user interaction.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and service providers relying on Linksys range extenders to expand wireless network coverage. Successful exploitation could lead to complete compromise of the affected devices, enabling attackers to intercept or manipulate network traffic, disrupt connectivity, or use the compromised devices as footholds for further attacks within corporate or critical infrastructure networks. This is particularly concerning for sectors with stringent data protection requirements under GDPR, as unauthorized access or data leakage could result in regulatory penalties and reputational damage. Additionally, the lack of vendor response and patches increases the window of exposure. Organizations with remote or distributed network environments that utilize these Linksys models are at heightened risk, as attackers can exploit the vulnerability remotely without authentication or user interaction, facilitating large-scale automated attacks or targeted intrusions.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately conduct comprehensive inventories to identify the presence of affected Linksys range extender models and firmware versions. Where possible, affected devices should be isolated from critical network segments or replaced with alternative hardware not vulnerable to this issue. Network segmentation should be enforced to limit access to management interfaces like /goform/setLan, ideally restricting them to trusted internal networks and blocking remote access via firewall rules. Intrusion detection and prevention systems should be configured to monitor and block suspicious HTTP requests targeting the setLan endpoint, especially those manipulating the 'lan2enabled' parameter. Organizations should also implement strict network monitoring to detect anomalous device behavior indicative of exploitation attempts. As a temporary workaround, disabling remote management features on these devices can reduce exposure. Finally, organizations should maintain close monitoring of vendor communications for any forthcoming patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-10T07:53:31.777Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68993a6cad5a09ad001cf0ff

Added to database: 8/11/2025, 12:33:48 AM

Last enriched: 8/18/2025, 1:06:06 AM

Last updated: 11/9/2025, 9:09:50 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats