CVE-2025-9357: Stack-based Buffer Overflow in Linksys RE6250
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function langSwitchByBBS of the file /goform/langSwitchByBBS. The manipulation of the argument langSelectionOnly leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9357 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the langSwitchByBBS function within the /goform/langSwitchByBBS endpoint. An attacker can remotely manipulate the langSelectionOnly argument to trigger a stack-based buffer overflow, potentially allowing arbitrary code execution or denial of service. The vulnerability requires no user interaction and no authentication, making it remotely exploitable over the network. The CVSS 4.0 base score is 8.7, reflecting the ease of exploitation (network attack vector, low complexity), no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as successful exploitation could lead to full device compromise, allowing attackers to intercept or manipulate network traffic, disrupt connectivity, or use the device as a foothold for further attacks. Although no patches or vendor responses have been reported, a public exploit is available, increasing the risk of exploitation. The vulnerability affects the core firmware of widely deployed Linksys range extenders, which are commonly used in home and small office networks to extend Wi-Fi coverage. The lack of vendor response and public exploit availability heighten the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for small and medium enterprises (SMEs) and home office environments relying on Linksys range extenders for network connectivity. Exploitation could lead to unauthorized network access, interception of sensitive communications, lateral movement within corporate networks, and disruption of network services. Given the remote exploitability without authentication, attackers can target vulnerable devices en masse, potentially creating botnets or launching further attacks against internal resources. The impact is particularly critical for organizations handling sensitive personal data under GDPR, as compromise could lead to data breaches and regulatory penalties. Additionally, disruption of network availability could affect business continuity. The presence of a public exploit increases the likelihood of opportunistic attacks, making timely mitigation essential.
Mitigation Recommendations
1. Immediate network segmentation: Isolate vulnerable Linksys range extenders from critical network segments to limit potential lateral movement if compromised. 2. Disable remote management interfaces on affected devices to reduce exposure to external attacks. 3. Monitor network traffic for unusual activity originating from or targeting these devices, including unexpected connections or command-and-control communications. 4. Replace or upgrade affected devices where possible, prioritizing models with updated firmware or alternative hardware from vendors with active security support. 5. If firmware updates become available, apply them promptly. Until then, consider deploying network-level protections such as firewall rules blocking access to the /goform/langSwitchByBBS endpoint or rate limiting requests to mitigate exploitation attempts. 6. Conduct regular vulnerability scans and penetration tests focusing on network extenders and IoT devices to detect exploitation attempts early. 7. Educate users about the risks of using unsupported or unpatched network devices and encourage reporting of connectivity anomalies.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-9357: Stack-based Buffer Overflow in Linksys RE6250
Description
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function langSwitchByBBS of the file /goform/langSwitchByBBS. The manipulation of the argument langSelectionOnly leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9357 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the langSwitchByBBS function within the /goform/langSwitchByBBS endpoint. An attacker can remotely manipulate the langSelectionOnly argument to trigger a stack-based buffer overflow, potentially allowing arbitrary code execution or denial of service. The vulnerability requires no user interaction and no authentication, making it remotely exploitable over the network. The CVSS 4.0 base score is 8.7, reflecting the ease of exploitation (network attack vector, low complexity), no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as successful exploitation could lead to full device compromise, allowing attackers to intercept or manipulate network traffic, disrupt connectivity, or use the device as a foothold for further attacks. Although no patches or vendor responses have been reported, a public exploit is available, increasing the risk of exploitation. The vulnerability affects the core firmware of widely deployed Linksys range extenders, which are commonly used in home and small office networks to extend Wi-Fi coverage. The lack of vendor response and public exploit availability heighten the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for small and medium enterprises (SMEs) and home office environments relying on Linksys range extenders for network connectivity. Exploitation could lead to unauthorized network access, interception of sensitive communications, lateral movement within corporate networks, and disruption of network services. Given the remote exploitability without authentication, attackers can target vulnerable devices en masse, potentially creating botnets or launching further attacks against internal resources. The impact is particularly critical for organizations handling sensitive personal data under GDPR, as compromise could lead to data breaches and regulatory penalties. Additionally, disruption of network availability could affect business continuity. The presence of a public exploit increases the likelihood of opportunistic attacks, making timely mitigation essential.
Mitigation Recommendations
1. Immediate network segmentation: Isolate vulnerable Linksys range extenders from critical network segments to limit potential lateral movement if compromised. 2. Disable remote management interfaces on affected devices to reduce exposure to external attacks. 3. Monitor network traffic for unusual activity originating from or targeting these devices, including unexpected connections or command-and-control communications. 4. Replace or upgrade affected devices where possible, prioritizing models with updated firmware or alternative hardware from vendors with active security support. 5. If firmware updates become available, apply them promptly. Until then, consider deploying network-level protections such as firewall rules blocking access to the /goform/langSwitchByBBS endpoint or rate limiting requests to mitigate exploitation attempts. 6. Conduct regular vulnerability scans and penetration tests focusing on network extenders and IoT devices to detect exploitation attempts early. 7. Educate users about the risks of using unsupported or unpatched network devices and encourage reporting of connectivity anomalies.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-22T15:40:15.687Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a95d0cad5a09ad00278c54
Added to database: 8/23/2025, 6:17:48 AM
Last enriched: 8/23/2025, 6:32:48 AM
Last updated: 8/23/2025, 6:32:48 AM
Views: 2
Related Threats
CVE-2025-9358: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-5352: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lunary-ai lunary-ai/lunary
HighCVE-2025-7813: CWE-918 Server-Side Request Forgery (SSRF) in arraytics Eventin – AI Powered Event Manager, Events Calendar, Booking and Tickets Plugin
HighCVE-2025-43764: CWE-1333 Inefficient Regular Expression Complexity in Liferay Portal
MediumCVE-2025-43765: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.