Skip to main content

CVE-2025-9247: Stack-based Buffer Overflow in Linksys RE6250

High
VulnerabilityCVE-2025-9247cvecve-2025-9247
Published: Wed Aug 20 2025 (08/20/2025, 20:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6250

Description

A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The affected element is the function setVlan of the file /goform/setVlan. The manipulation of the argument vlan_set leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/20/2025, 21:02:45 UTC

Technical Analysis

CVE-2025-9247 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, across several firmware versions (1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001). The vulnerability resides in the setVlan function within the /goform/setVlan endpoint, where improper handling of the vlan_set argument allows an attacker to overflow the stack buffer. This flaw can be exploited remotely without requiring user interaction or prior authentication, making it highly accessible to attackers. The buffer overflow can lead to arbitrary code execution with elevated privileges, potentially allowing full compromise of the device. The vendor, Linksys, has not responded to disclosure attempts, and no patches have been released at the time of publication. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of imminent attacks. The CVSS 4.0 score of 8.7 reflects the vulnerability’s critical impact on confidentiality, integrity, and availability, combined with its ease of exploitation and lack of required privileges or user interaction.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and small-to-medium businesses relying on Linksys range extenders to improve wireless network coverage. Successful exploitation could allow attackers to gain control over network infrastructure devices, enabling interception or manipulation of network traffic, lateral movement within internal networks, and potential deployment of further malware or ransomware. This could lead to data breaches, disruption of business operations, and compromise of sensitive information. Given the remote exploitability and lack of vendor patching, attackers could rapidly weaponize this vulnerability. Critical infrastructure sectors, including finance, healthcare, and government entities in Europe, often use such network devices, increasing the potential impact. Additionally, home office environments, which have grown in prevalence, may also be vulnerable, potentially serving as entry points for attacks against corporate networks.

Mitigation Recommendations

Immediate mitigation should focus on network segmentation to isolate vulnerable Linksys devices from critical internal networks. Organizations should disable remote management features on these devices to reduce exposure. Monitoring network traffic for unusual activity targeting the /goform/setVlan endpoint can help detect exploitation attempts. Since no official patches are available, organizations should consider replacing affected devices with models from vendors that provide timely security updates. Applying strict firewall rules to restrict access to the management interfaces of these devices is critical. Additionally, organizations should implement network intrusion detection systems (NIDS) with signatures tailored to detect attempts exploiting this specific buffer overflow. Regularly auditing network devices for vulnerable firmware versions and maintaining an asset inventory will aid in rapid identification and remediation. Finally, organizations should stay alert for vendor updates or third-party patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-20T11:16:47.939Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a63474ad5a09ad0008ea3a

Added to database: 8/20/2025, 8:47:48 PM

Last enriched: 8/20/2025, 9:02:45 PM

Last updated: 8/21/2025, 8:11:00 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats