Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9253: Stack-based Buffer Overflow in Linksys RE6250

0
High
VulnerabilityCVE-2025-9253cvecve-2025-9253
Published: Wed Aug 20 2025 (08/20/2025, 22:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6250

Description

A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RP_doSpecifySiteSurvey of the file /goform/RP_doSpecifySiteSurvey. The manipulation of the argument ssidhex leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/28/2025, 01:30:32 UTC

Technical Analysis

CVE-2025-9253 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the RP_doSpecifySiteSurvey function within the /goform/RP_doSpecifySiteSurvey endpoint. An attacker can remotely exploit this flaw by manipulating the ssidhex argument, causing a stack-based buffer overflow. This type of overflow can overwrite the call stack, potentially allowing arbitrary code execution, denial of service, or system compromise. The vulnerability requires no user interaction and no authentication, making it remotely exploitable over the network. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although the vendor was notified early, no response or patch has been issued, and while no known exploits are currently observed in the wild, public disclosure of the exploit code increases the risk of imminent attacks. This vulnerability is critical for network security as these devices often serve as wireless access points or extenders, and compromise could lead to lateral movement within networks or interception of sensitive communications.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network infrastructure security. Linksys range extenders are commonly used in both enterprise and residential environments across Europe to enhance Wi-Fi coverage. Exploitation could lead to unauthorized access to internal networks, data exfiltration, or disruption of wireless services. Critical sectors such as finance, healthcare, and government agencies that rely on secure and stable wireless connectivity could face operational disruptions or data breaches. Additionally, compromised devices could be leveraged as pivot points for broader attacks, including ransomware or espionage campaigns. The lack of vendor response and patches exacerbates the threat, leaving organizations exposed. Given the remote exploitability without authentication, attackers can target vulnerable devices from anywhere, increasing the attack surface. The potential for high confidentiality, integrity, and availability impact makes this vulnerability particularly dangerous for European organizations with sensitive data and compliance obligations under regulations like GDPR.

Mitigation Recommendations

Organizations should immediately inventory their network infrastructure to identify any affected Linksys range extender models and firmware versions. Since no official patches are available, mitigation should focus on network-level controls: isolate vulnerable devices on segmented VLANs with strict access controls, disable remote management interfaces if not required, and restrict inbound traffic to these devices using firewalls. Monitoring network traffic for unusual activity related to the /goform/RP_doSpecifySiteSurvey endpoint or malformed ssidhex parameters can help detect exploitation attempts. Where possible, replace affected devices with models from vendors that provide timely security updates. Additionally, implement network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect buffer overflow attempts targeting Linksys devices. Regularly review vendor communications for updates or patches. Educate IT staff on this vulnerability to ensure rapid response to any suspicious activity. Finally, consider deploying network segmentation and zero-trust principles to limit the impact of any potential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-20T11:17:03.780Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a65094ad5a09ad00096d21

Added to database: 8/20/2025, 10:47:48 PM

Last enriched: 8/28/2025, 1:30:32 AM

Last updated: 11/19/2025, 12:53:50 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats