Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9247: Stack-based Buffer Overflow in Linksys RE6250

0
High
VulnerabilityCVE-2025-9247cvecve-2025-9247
Published: Wed Aug 20 2025 (08/20/2025, 20:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6250

Description

A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The affected element is the function setVlan of the file /goform/setVlan. The manipulation of the argument vlan_set leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/28/2025, 01:29:15 UTC

Technical Analysis

CVE-2025-9247 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the setVlan function within the /goform/setVlan endpoint. An attacker can remotely manipulate the vlan_set argument to trigger a stack-based buffer overflow, potentially allowing arbitrary code execution or denial of service. The vulnerability is remotely exploitable without user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS 4.0 base score is 8.7, reflecting high impact on confidentiality, integrity, and availability with low attack complexity. Although the vendor was notified early, no response or patch has been released, and public exploit code has been disclosed, increasing the risk of exploitation. The vulnerability affects critical network infrastructure devices that extend wireless network coverage, which are often deployed in both home and enterprise environments. The lack of patch availability combined with public exploit disclosure elevates the urgency for mitigation and risk management.

Potential Impact

For European organizations, this vulnerability poses significant risks to network security and operational continuity. Linksys range extenders are widely used to improve wireless coverage in offices, retail locations, and industrial sites. Exploitation could allow attackers to execute arbitrary code on these devices, leading to network compromise, interception or manipulation of traffic, lateral movement within internal networks, or complete denial of service of network extension capabilities. This can disrupt business operations, degrade service availability, and expose sensitive data. The remote and unauthenticated nature of the exploit increases the attack surface, especially for organizations with exposed or poorly segmented network infrastructure. Given the public availability of exploit code and the absence of vendor patches, European entities face an elevated threat level, particularly those relying on vulnerable Linksys models in critical environments. The impact extends beyond confidentiality breaches to include integrity and availability concerns, potentially affecting compliance with data protection regulations such as GDPR if personal data is compromised or service interruptions occur.

Mitigation Recommendations

Immediate mitigation steps should include: 1) Inventory and identify all Linksys range extenders in use, focusing on the affected models and firmware versions. 2) Isolate vulnerable devices from direct internet exposure by implementing network segmentation and firewall rules restricting access to management interfaces, especially the /goform/setVlan endpoint. 3) Disable remote management features if not strictly necessary to reduce attack vectors. 4) Monitor network traffic for unusual requests targeting the vlan_set parameter or signs of exploitation attempts. 5) Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts. 6) Engage with Linksys support channels persistently to demand patch releases or official guidance. 7) Consider replacing vulnerable devices with alternatives from vendors providing timely security updates if patches remain unavailable. 8) Implement compensating controls such as VPN access for management and strict authentication mechanisms to reduce unauthorized access risk. 9) Regularly review and update network security policies to incorporate lessons learned from this vulnerability. These targeted actions go beyond generic advice by focusing on device-specific controls and proactive network defense measures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-20T11:16:47.939Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a63474ad5a09ad0008ea3a

Added to database: 8/20/2025, 8:47:48 PM

Last enriched: 8/28/2025, 1:29:15 AM

Last updated: 10/7/2025, 3:53:38 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats