CVE-2025-9359: Stack-based Buffer Overflow in Linksys RE6250
A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. This manipulation of the argument ssidhex/pwd causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9359 is a high-severity stack-based buffer overflow vulnerability affecting multiple versions of Linksys range extender devices, specifically models RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 running firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the function RP_checkCredentialsByBBS within the /goform/RP_checkCredentialsByBBS endpoint. This function processes arguments ssidhex and pwd, and improper handling of these inputs allows an attacker to cause a stack-based buffer overflow. The overflow can be triggered remotely without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability with high impact metrics, enabling potential remote code execution or denial of service. The vendor has not responded to early disclosure attempts, and while no public exploit is confirmed in the wild, proof-of-concept code is available publicly, increasing the risk of exploitation. The vulnerability affects embedded firmware in widely deployed consumer and small business networking devices, which often have limited security controls and are frequently exposed to the internet or local networks. The lack of vendor patch availability further exacerbates the risk, leaving devices vulnerable to exploitation by attackers who can craft malicious requests to the vulnerable endpoint to execute arbitrary code or crash the device, potentially disrupting network connectivity or enabling further network compromise.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for small and medium enterprises (SMEs) and home office environments that rely on Linksys range extenders for network coverage. Exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over the device, intercept or manipulate network traffic, or launch lateral attacks within the network. This could result in data breaches, disruption of business operations, and compromise of sensitive information. The vulnerability's remote exploitability without authentication increases the attack surface, particularly for devices exposed to the internet or poorly segmented internal networks. Given the widespread use of Linksys devices in Europe, especially in countries with high consumer and SME adoption of Linksys networking products, the threat could impact critical infrastructure sectors that depend on stable network connectivity. The absence of vendor patches means organizations must rely on alternative mitigations, increasing operational complexity and risk. Additionally, the public availability of exploit code raises the likelihood of opportunistic attacks targeting vulnerable devices across Europe.
Mitigation Recommendations
Since no official patches are currently available from Linksys, European organizations should implement immediate compensating controls. These include isolating affected devices from direct internet exposure by placing them behind firewalls or VPNs, disabling remote management interfaces if enabled, and restricting access to the vulnerable /goform/RP_checkCredentialsByBBS endpoint via network segmentation or access control lists. Network monitoring should be enhanced to detect anomalous requests targeting this endpoint or unusual device behavior indicative of exploitation attempts. Organizations should inventory all Linksys range extenders to identify affected models and firmware versions and plan for device replacement or firmware upgrade once patches are released. Employing network intrusion detection/prevention systems (IDS/IPS) with updated signatures can help block exploit attempts. Additionally, educating users about the risks and encouraging secure network configurations will reduce exposure. For critical environments, consider deploying alternative hardware from vendors with active security support until a vendor patch is available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-9359: Stack-based Buffer Overflow in Linksys RE6250
Description
A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. This manipulation of the argument ssidhex/pwd causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9359 is a high-severity stack-based buffer overflow vulnerability affecting multiple versions of Linksys range extender devices, specifically models RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 running firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the function RP_checkCredentialsByBBS within the /goform/RP_checkCredentialsByBBS endpoint. This function processes arguments ssidhex and pwd, and improper handling of these inputs allows an attacker to cause a stack-based buffer overflow. The overflow can be triggered remotely without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability with high impact metrics, enabling potential remote code execution or denial of service. The vendor has not responded to early disclosure attempts, and while no public exploit is confirmed in the wild, proof-of-concept code is available publicly, increasing the risk of exploitation. The vulnerability affects embedded firmware in widely deployed consumer and small business networking devices, which often have limited security controls and are frequently exposed to the internet or local networks. The lack of vendor patch availability further exacerbates the risk, leaving devices vulnerable to exploitation by attackers who can craft malicious requests to the vulnerable endpoint to execute arbitrary code or crash the device, potentially disrupting network connectivity or enabling further network compromise.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for small and medium enterprises (SMEs) and home office environments that rely on Linksys range extenders for network coverage. Exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over the device, intercept or manipulate network traffic, or launch lateral attacks within the network. This could result in data breaches, disruption of business operations, and compromise of sensitive information. The vulnerability's remote exploitability without authentication increases the attack surface, particularly for devices exposed to the internet or poorly segmented internal networks. Given the widespread use of Linksys devices in Europe, especially in countries with high consumer and SME adoption of Linksys networking products, the threat could impact critical infrastructure sectors that depend on stable network connectivity. The absence of vendor patches means organizations must rely on alternative mitigations, increasing operational complexity and risk. Additionally, the public availability of exploit code raises the likelihood of opportunistic attacks targeting vulnerable devices across Europe.
Mitigation Recommendations
Since no official patches are currently available from Linksys, European organizations should implement immediate compensating controls. These include isolating affected devices from direct internet exposure by placing them behind firewalls or VPNs, disabling remote management interfaces if enabled, and restricting access to the vulnerable /goform/RP_checkCredentialsByBBS endpoint via network segmentation or access control lists. Network monitoring should be enhanced to detect anomalous requests targeting this endpoint or unusual device behavior indicative of exploitation attempts. Organizations should inventory all Linksys range extenders to identify affected models and firmware versions and plan for device replacement or firmware upgrade once patches are released. Employing network intrusion detection/prevention systems (IDS/IPS) with updated signatures can help block exploit attempts. Additionally, educating users about the risks and encouraging secure network configurations will reduce exposure. For critical environments, consider deploying alternative hardware from vendors with active security support until a vendor patch is available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-22T15:40:20.930Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a98e5dad5a09ad00288aa1
Added to database: 8/23/2025, 9:48:13 AM
Last enriched: 8/23/2025, 10:02:50 AM
Last updated: 8/23/2025, 11:34:43 AM
Views: 3
Related Threats
CVE-2025-9363: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9362: Stack-based Buffer Overflow in Linksys RE6250
MediumCVE-2025-9361: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9360: Stack-based Buffer Overflow in Linksys RE6250
HighMurky Panda hackers exploit cloud trust to hack downstream customers
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.