Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9362: Stack-based Buffer Overflow in Linksys RE6250

0
Medium
VulnerabilityCVE-2025-9362cvecve-2025-9362
Published: Sat Aug 23 2025 (08/23/2025, 13:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6250

Description

A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The impacted element is the function urlFilterManageRule of the file /goform/urlFilterManageRule. Executing manipulation of the argument urlFilterRuleName/scheduleUrl/addURLFilter can lead to stack-based buffer overflow. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/31/2025, 01:07:38 UTC

Technical Analysis

CVE-2025-9362 is a medium-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the urlFilterManageRule function within the /goform/urlFilterManageRule endpoint. This function processes parameters such as urlFilterRuleName, scheduleUrl, and addURLFilter. Improper handling of these arguments allows an attacker to trigger a stack-based buffer overflow remotely without requiring authentication or user interaction. The overflow can potentially lead to arbitrary code execution or denial of service on the affected device. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Despite early notification, the vendor has not responded or released patches, and no known exploits have been observed in the wild yet. This lack of vendor response increases the risk for users as no official remediation is currently available.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to network infrastructure relying on the affected Linksys range extenders. Exploitation could allow remote attackers to compromise these devices, potentially gaining control over network traffic filtering rules or causing device outages. This can lead to degraded network performance, disruption of business operations, and possible lateral movement within internal networks if attackers leverage the compromised devices as footholds. Confidentiality risks are limited but not negligible, as attackers might manipulate URL filtering to bypass security controls or intercept traffic. The absence of vendor patches increases exposure time, especially in environments where these devices are deployed in critical network segments or remote office locations. Organizations using these devices without compensating controls may face increased risk of targeted attacks or automated scanning attempts exploiting this flaw.

Mitigation Recommendations

Given the lack of official patches, European organizations should take immediate compensatory measures: 1) Identify and inventory all affected Linksys range extender models and firmware versions in their networks. 2) Isolate vulnerable devices from untrusted networks, especially the internet, by placing them behind firewalls or restricting management interfaces to trusted IP addresses only. 3) Disable or restrict the urlFilterManageRule functionality if possible, or disable remote management features to reduce attack surface. 4) Monitor network traffic and device logs for unusual requests targeting /goform/urlFilterManageRule or signs of buffer overflow exploitation attempts. 5) Consider replacing vulnerable devices with updated hardware or alternative products from vendors with active security support. 6) Implement network segmentation to limit potential lateral movement from compromised devices. 7) Stay alert for vendor updates or community-developed patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-22T15:40:30.483Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a9c681ad5a09ad00296a19

Added to database: 8/23/2025, 1:47:45 PM

Last enriched: 8/31/2025, 1:07:38 AM

Last updated: 10/8/2025, 5:15:07 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats