CVE-2025-9246: Stack-based Buffer Overflow in Linksys RE6250
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Impacted is the function check_port_conflict of the file /goform/check_port_conflict. Executing manipulation of the argument single_port_rule/port_range_rule can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9246 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the function check_port_conflict within the /goform/check_port_conflict endpoint. This function processes input parameters single_port_rule and port_range_rule, which, when maliciously crafted, can overflow the stack buffer. This overflow can lead to arbitrary code execution or denial of service. The attack vector is remote network access, requiring no user interaction and minimal privileges (low privileges) to exploit. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with an exploitability rating of low complexity and no authentication required. The vendor Linksys was notified early but has not responded or issued patches, and while no known exploits are currently observed in the wild, a public exploit has been published, increasing the risk of exploitation. The vulnerability's impact includes potential full compromise of the affected device, allowing attackers to execute arbitrary code, disrupt network connectivity, or pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for enterprises and small-to-medium businesses relying on Linksys range extenders to improve wireless coverage. Exploitation could lead to network disruption, loss of device availability, and unauthorized access to internal networks, potentially exposing sensitive data and critical infrastructure. Given that these devices often serve as network bridges or access points, attackers could leverage compromised extenders to launch lateral movement attacks or intercept network traffic. The lack of vendor response and patches increases the window of exposure. Organizations in sectors with high reliance on stable and secure network infrastructure, such as finance, healthcare, and critical infrastructure, are particularly vulnerable. Additionally, home office setups using these devices may be targeted to gain footholds into corporate networks via VPN or remote access connections.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected Linksys extenders from critical network segments to limit potential lateral movement. 2. Disable remote management interfaces on affected devices to reduce attack surface. 3. Monitor network traffic for unusual activity originating from or targeting these extenders. 4. Replace or upgrade affected devices where possible, prioritizing models with updated firmware or alternative vendors with timely patch support. 5. If replacement is not immediately feasible, implement strict firewall rules to restrict access to the /goform/check_port_conflict endpoint or block suspicious payloads targeting single_port_rule and port_range_rule parameters. 6. Conduct regular vulnerability scans and penetration tests focusing on network edge devices. 7. Educate IT staff about this vulnerability and the importance of monitoring and rapid response. 8. Engage with Linksys support channels persistently for updates and patches, and consider reporting to national cybersecurity authorities if vendor support remains absent.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2025-9246: Stack-based Buffer Overflow in Linksys RE6250
Description
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Impacted is the function check_port_conflict of the file /goform/check_port_conflict. Executing manipulation of the argument single_port_rule/port_range_rule can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9246 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the function check_port_conflict within the /goform/check_port_conflict endpoint. This function processes input parameters single_port_rule and port_range_rule, which, when maliciously crafted, can overflow the stack buffer. This overflow can lead to arbitrary code execution or denial of service. The attack vector is remote network access, requiring no user interaction and minimal privileges (low privileges) to exploit. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with an exploitability rating of low complexity and no authentication required. The vendor Linksys was notified early but has not responded or issued patches, and while no known exploits are currently observed in the wild, a public exploit has been published, increasing the risk of exploitation. The vulnerability's impact includes potential full compromise of the affected device, allowing attackers to execute arbitrary code, disrupt network connectivity, or pivot into internal networks.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for enterprises and small-to-medium businesses relying on Linksys range extenders to improve wireless coverage. Exploitation could lead to network disruption, loss of device availability, and unauthorized access to internal networks, potentially exposing sensitive data and critical infrastructure. Given that these devices often serve as network bridges or access points, attackers could leverage compromised extenders to launch lateral movement attacks or intercept network traffic. The lack of vendor response and patches increases the window of exposure. Organizations in sectors with high reliance on stable and secure network infrastructure, such as finance, healthcare, and critical infrastructure, are particularly vulnerable. Additionally, home office setups using these devices may be targeted to gain footholds into corporate networks via VPN or remote access connections.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected Linksys extenders from critical network segments to limit potential lateral movement. 2. Disable remote management interfaces on affected devices to reduce attack surface. 3. Monitor network traffic for unusual activity originating from or targeting these extenders. 4. Replace or upgrade affected devices where possible, prioritizing models with updated firmware or alternative vendors with timely patch support. 5. If replacement is not immediately feasible, implement strict firewall rules to restrict access to the /goform/check_port_conflict endpoint or block suspicious payloads targeting single_port_rule and port_range_rule parameters. 6. Conduct regular vulnerability scans and penetration tests focusing on network edge devices. 7. Educate IT staff about this vulnerability and the importance of monitoring and rapid response. 8. Engage with Linksys support channels persistently for updates and patches, and consider reporting to national cybersecurity authorities if vendor support remains absent.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-20T11:16:45.220Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a629e8ad5a09ad000895c5
Added to database: 8/20/2025, 8:02:48 PM
Last enriched: 8/20/2025, 8:17:46 PM
Last updated: 8/21/2025, 12:35:14 AM
Views: 3
Related Threats
CVE-2025-43300: Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. in Apple macOS
UnknownCVE-2025-57748
LowCVE-2025-57747
LowCVE-2025-57746
LowCVE-2025-57745
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.