CVE-2025-9359: Stack-based Buffer Overflow in Linksys RE6250
A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. This manipulation of the argument ssidhex/pwd causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9359 is a high-severity stack-based buffer overflow vulnerability affecting multiple versions of Linksys range extender models RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000. The vulnerable versions include firmware releases 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The flaw resides in the function RP_checkCredentialsByBBS within the /goform/RP_checkCredentialsByBBS endpoint, which processes the ssidhex and pwd parameters. Improper handling of these inputs allows an attacker to overflow the stack buffer, potentially overwriting critical memory regions. This vulnerability can be exploited remotely without user interaction or prior authentication, as the affected function is accessible via network requests. The CVSS 4.0 base score is 8.7, reflecting a high severity due to the network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no patches have been released and the vendor has not responded to disclosure attempts, a public exploit is available, increasing the risk of exploitation. The vulnerability could allow attackers to execute arbitrary code, cause denial of service, or gain unauthorized access to the device, potentially enabling lateral movement within networks or interception of traffic passing through the range extenders.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for enterprises and service providers relying on Linksys range extenders to improve wireless coverage. Successful exploitation could lead to compromise of network infrastructure components, enabling attackers to intercept sensitive communications, disrupt network availability, or pivot to internal systems. Given that these devices often operate at network edges or in less physically secure locations, attackers could exploit this remotely without physical access. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government agencies in Europe. The lack of vendor response and patches exacerbates the threat, increasing the window of exposure. Additionally, the availability of a public exploit lowers the barrier for threat actors, including cybercriminals and state-sponsored groups, to weaponize this vulnerability against European targets.
Mitigation Recommendations
Organizations should immediately inventory their network infrastructure to identify any affected Linksys range extender models and firmware versions. Until official patches are available, it is critical to isolate these devices from untrusted networks by restricting management interfaces to trusted internal IP ranges and implementing strict firewall rules to block access to the /goform/RP_checkCredentialsByBBS endpoint. Network segmentation should be enhanced to limit the impact of a compromised device. Monitoring network traffic for unusual requests targeting the vulnerable endpoint can help detect exploitation attempts. Where possible, replace vulnerable devices with updated hardware or alternative products from vendors with active security support. Additionally, organizations should implement network intrusion detection/prevention systems (IDS/IPS) with signatures for this exploit once available. Regularly reviewing vendor communications for updates and applying patches promptly when released is essential to long-term mitigation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2025-9359: Stack-based Buffer Overflow in Linksys RE6250
Description
A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. This manipulation of the argument ssidhex/pwd causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9359 is a high-severity stack-based buffer overflow vulnerability affecting multiple versions of Linksys range extender models RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000. The vulnerable versions include firmware releases 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The flaw resides in the function RP_checkCredentialsByBBS within the /goform/RP_checkCredentialsByBBS endpoint, which processes the ssidhex and pwd parameters. Improper handling of these inputs allows an attacker to overflow the stack buffer, potentially overwriting critical memory regions. This vulnerability can be exploited remotely without user interaction or prior authentication, as the affected function is accessible via network requests. The CVSS 4.0 base score is 8.7, reflecting a high severity due to the network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no patches have been released and the vendor has not responded to disclosure attempts, a public exploit is available, increasing the risk of exploitation. The vulnerability could allow attackers to execute arbitrary code, cause denial of service, or gain unauthorized access to the device, potentially enabling lateral movement within networks or interception of traffic passing through the range extenders.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for enterprises and service providers relying on Linksys range extenders to improve wireless coverage. Successful exploitation could lead to compromise of network infrastructure components, enabling attackers to intercept sensitive communications, disrupt network availability, or pivot to internal systems. Given that these devices often operate at network edges or in less physically secure locations, attackers could exploit this remotely without physical access. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government agencies in Europe. The lack of vendor response and patches exacerbates the threat, increasing the window of exposure. Additionally, the availability of a public exploit lowers the barrier for threat actors, including cybercriminals and state-sponsored groups, to weaponize this vulnerability against European targets.
Mitigation Recommendations
Organizations should immediately inventory their network infrastructure to identify any affected Linksys range extender models and firmware versions. Until official patches are available, it is critical to isolate these devices from untrusted networks by restricting management interfaces to trusted internal IP ranges and implementing strict firewall rules to block access to the /goform/RP_checkCredentialsByBBS endpoint. Network segmentation should be enhanced to limit the impact of a compromised device. Monitoring network traffic for unusual requests targeting the vulnerable endpoint can help detect exploitation attempts. Where possible, replace vulnerable devices with updated hardware or alternative products from vendors with active security support. Additionally, organizations should implement network intrusion detection/prevention systems (IDS/IPS) with signatures for this exploit once available. Regularly reviewing vendor communications for updates and applying patches promptly when released is essential to long-term mitigation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-22T15:40:20.930Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a98e5dad5a09ad00288aa1
Added to database: 8/23/2025, 9:48:13 AM
Last enriched: 8/31/2025, 1:07:05 AM
Last updated: 10/8/2025, 5:15:07 AM
Views: 95
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11204: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in metagauss RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
HighCVE-2025-11432: SQL Injection in itsourcecode Leave Management System
MediumCVE-2025-11431: SQL Injection in code-projects Web-Based Inventory and POS System
MediumCVE-2025-11430: SQL Injection in SourceCodester Simple E-Commerce Bookstore
MediumCVE-2025-10587: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in jackdewey Community Events
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.