Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9249: Stack-based Buffer Overflow in Linksys RE6250

0
High
VulnerabilityCVE-2025-9249cvecve-2025-9249
Published: Wed Aug 20 2025 (08/20/2025, 21:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6250

Description

A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function DHCPReserveAddGroup of the file /goform/DHCPReserveAddGroup. This manipulation of the argument enable_group/name_group/ip_group/mac_group causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/28/2025, 01:29:38 UTC

Technical Analysis

CVE-2025-9249 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the DHCPReserveAddGroup function, located in the /goform/DHCPReserveAddGroup endpoint. This function improperly handles input parameters such as enable_group, name_group, ip_group, and mac_group, allowing an attacker to craft malicious requests that overflow the stack buffer. The overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable without user interaction or authentication, increasing its risk profile. Although the vendor was notified early, there has been no response or patch released at the time of publication. The CVSS v4.0 score is 8.7, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. The exploit has been publicly disclosed, but no known active exploitation has been reported yet. Given the nature of the vulnerability, attackers could leverage it to gain control over the affected devices, potentially pivoting into internal networks or disrupting network connectivity.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and small-to-medium businesses relying on Linksys range extenders for network coverage. Successful exploitation could allow attackers to execute arbitrary code on these devices, compromising network integrity and confidentiality. This could lead to interception or manipulation of internal traffic, unauthorized access to connected devices, or disruption of network services. Critical infrastructure operators and organizations with sensitive data could face operational disruptions or data breaches. The lack of vendor response and patches increases the window of exposure. Additionally, since these devices are often deployed in home offices and branch locations, the vulnerability could be exploited as an entry point into corporate networks, undermining perimeter defenses. The remote, unauthenticated nature of the exploit further elevates the threat, making it accessible to a wide range of attackers, including opportunistic threat actors and potentially nation-state actors targeting European entities.

Mitigation Recommendations

Immediate mitigation should focus on network-level controls and device management. Organizations should identify and inventory all affected Linksys range extenders within their environment. Where possible, isolate these devices from critical network segments and restrict access to the /goform/DHCPReserveAddGroup endpoint using firewall rules or network segmentation. Disable remote management features on these devices to reduce exposure. Employ intrusion detection systems (IDS) or intrusion prevention systems (IPS) with signatures or heuristics to detect anomalous DHCPReserveAddGroup requests indicative of exploitation attempts. Monitor network traffic for unusual patterns targeting these devices. Since no official patches are available, consider replacing vulnerable devices with updated hardware or alternative products from vendors with active security support. Additionally, implement strict network access controls and multi-factor authentication on upstream network devices to limit lateral movement if a device is compromised. Regularly review vendor communications for updates or patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-20T11:16:53.274Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a63b7cad5a09ad000917f8

Added to database: 8/20/2025, 9:17:48 PM

Last enriched: 8/28/2025, 1:29:38 AM

Last updated: 10/5/2025, 8:25:39 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats