CVE-2025-9250: Stack-based Buffer Overflow in Linksys RE6250
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This impacts the function setPWDbyBBS of the file /goform/setPWDbyBBS. Such manipulation of the argument hint leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9250 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the function setPWDbyBBS within the /goform/setPWDbyBBS endpoint. This function improperly handles the 'hint' argument, allowing an attacker to craft a malicious request that overflows the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability can be exploited remotely without user interaction or authentication, increasing its risk profile. The CVSS 4.0 base score is 8.7, reflecting the ease of remote exploitation (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no patches have been released and the vendor has not responded to disclosure attempts, a public exploit is available, which raises the likelihood of active exploitation in the wild. The vulnerability affects the core functionality of these devices, which are commonly used to extend wireless network coverage, potentially exposing internal networks to compromise if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Linksys range extenders in their network infrastructure. Exploitation could allow attackers to gain unauthorized access to internal networks by compromising the range extender, which often bridges wireless and wired segments. This could lead to data exfiltration, lateral movement within corporate networks, or disruption of network availability. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable devices over the internet or local networks without requiring user interaction. The lack of vendor response and patches increases the window of exposure. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, may face regulatory and operational consequences if exploited. Additionally, compromised devices could be leveraged as entry points for broader cyberattacks or as part of botnets, amplifying the threat landscape in Europe.
Mitigation Recommendations
Immediate mitigation should focus on identifying and isolating vulnerable Linksys range extenders within the network. Network administrators should conduct thorough inventories to detect affected models and firmware versions. Until patches are available, organizations should restrict remote access to these devices by implementing firewall rules that block inbound traffic to the management interfaces, especially the /goform/setPWDbyBBS endpoint if possible. Disabling remote management features or changing default credentials can reduce exposure. Network segmentation should be enforced to limit the range extender's access to critical systems. Monitoring network traffic for unusual patterns or exploit attempts targeting the vulnerable endpoint is recommended. Where feasible, replacing vulnerable devices with models from vendors with active security support is advisable. Organizations should also engage with Linksys support channels to seek updates or advisories and subscribe to vulnerability intelligence feeds for timely patch releases. Implementing intrusion detection/prevention systems (IDS/IPS) with signatures for this exploit can provide additional defense layers.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-9250: Stack-based Buffer Overflow in Linksys RE6250
Description
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This impacts the function setPWDbyBBS of the file /goform/setPWDbyBBS. Such manipulation of the argument hint leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9250 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the function setPWDbyBBS within the /goform/setPWDbyBBS endpoint. This function improperly handles the 'hint' argument, allowing an attacker to craft a malicious request that overflows the stack buffer. This overflow can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability can be exploited remotely without user interaction or authentication, increasing its risk profile. The CVSS 4.0 base score is 8.7, reflecting the ease of remote exploitation (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no patches have been released and the vendor has not responded to disclosure attempts, a public exploit is available, which raises the likelihood of active exploitation in the wild. The vulnerability affects the core functionality of these devices, which are commonly used to extend wireless network coverage, potentially exposing internal networks to compromise if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Linksys range extenders in their network infrastructure. Exploitation could allow attackers to gain unauthorized access to internal networks by compromising the range extender, which often bridges wireless and wired segments. This could lead to data exfiltration, lateral movement within corporate networks, or disruption of network availability. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable devices over the internet or local networks without requiring user interaction. The lack of vendor response and patches increases the window of exposure. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, may face regulatory and operational consequences if exploited. Additionally, compromised devices could be leveraged as entry points for broader cyberattacks or as part of botnets, amplifying the threat landscape in Europe.
Mitigation Recommendations
Immediate mitigation should focus on identifying and isolating vulnerable Linksys range extenders within the network. Network administrators should conduct thorough inventories to detect affected models and firmware versions. Until patches are available, organizations should restrict remote access to these devices by implementing firewall rules that block inbound traffic to the management interfaces, especially the /goform/setPWDbyBBS endpoint if possible. Disabling remote management features or changing default credentials can reduce exposure. Network segmentation should be enforced to limit the range extender's access to critical systems. Monitoring network traffic for unusual patterns or exploit attempts targeting the vulnerable endpoint is recommended. Where feasible, replacing vulnerable devices with models from vendors with active security support is advisable. Organizations should also engage with Linksys support channels to seek updates or advisories and subscribe to vulnerability intelligence feeds for timely patch releases. Implementing intrusion detection/prevention systems (IDS/IPS) with signatures for this exploit can provide additional defense layers.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-20T11:16:55.733Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a64284ad5a09ad00093436
Added to database: 8/20/2025, 9:47:48 PM
Last enriched: 8/20/2025, 10:02:46 PM
Last updated: 8/21/2025, 12:35:14 AM
Views: 3
Related Threats
CVE-2025-53505: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Intermesh BV Group-Office
MediumCVE-2025-53504: Cross-site scripting (XSS) in Intermesh BV Group-Office
MediumCVE-2025-48355: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in ProveSource LTD ProveSource Social Proof
MediumCVE-2025-57832
LowCVE-2025-57831
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.