CVE-2025-9392: Stack-based Buffer Overflow in Linksys RE6250
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function qosClassifier of the file /goform/qosClassifier. Such manipulation of the argument dir/sFromPort/sToPort/dFromPort/dToPort/protocol/layer7/dscp/remark_dscp leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9392 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the qosClassifier function within the /goform/qosClassifier endpoint, where improper handling and validation of parameters such as dir, sFromPort, sToPort, dFromPort, dToPort, protocol, layer7, dscp, and remark_dscp can lead to a stack-based buffer overflow. This flaw can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability allows an attacker to potentially execute arbitrary code with elevated privileges, compromising the confidentiality, integrity, and availability of the affected device. Despite early notification, Linksys has not responded or issued patches, and the exploit code has been publicly disclosed, increasing the risk of exploitation. The vulnerability's CVSS 4.0 score is 8.7 (high), reflecting its critical nature and ease of exploitation. The absence of vendor patches and public exploit availability make this a significant threat to networks relying on these devices for Wi-Fi extension and connectivity.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for enterprises and small-to-medium businesses that deploy Linksys range extenders to improve wireless coverage. Successful exploitation can lead to full device compromise, enabling attackers to intercept or manipulate network traffic, launch further attacks within the internal network, or disrupt network availability. Given that these devices often operate at network edges or in less monitored segments, attackers could establish persistent footholds or pivot to more critical infrastructure. The lack of vendor response and patches increases the window of exposure. Additionally, organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) face heightened risks of regulatory non-compliance and reputational damage if exploited. The remote, unauthenticated nature of the exploit means attackers can target vulnerable devices over the internet or local networks without user interaction, amplifying the threat landscape across European networks.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls and device isolation. Organizations should: 1) Identify and inventory all affected Linksys range extenders within their environment. 2) Restrict access to the management interfaces of these devices by implementing strict firewall rules limiting access to trusted IP addresses only. 3) Segment the network to isolate vulnerable extenders from critical systems and sensitive data. 4) Monitor network traffic for anomalous requests to /goform/qosClassifier or unusual port scanning activities targeting these devices. 5) Disable or restrict QoS features if possible, to reduce attack surface. 6) Where feasible, replace vulnerable devices with models from vendors with active security support. 7) Engage with Linksys support channels persistently to seek firmware updates or official patches. 8) Employ intrusion detection/prevention systems (IDS/IPS) signatures that detect exploitation attempts targeting this vulnerability. These steps go beyond generic advice by focusing on compensating controls and proactive detection in the absence of vendor patches.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-9392: Stack-based Buffer Overflow in Linksys RE6250
Description
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function qosClassifier of the file /goform/qosClassifier. Such manipulation of the argument dir/sFromPort/sToPort/dFromPort/dToPort/protocol/layer7/dscp/remark_dscp leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9392 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the qosClassifier function within the /goform/qosClassifier endpoint, where improper handling and validation of parameters such as dir, sFromPort, sToPort, dFromPort, dToPort, protocol, layer7, dscp, and remark_dscp can lead to a stack-based buffer overflow. This flaw can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability allows an attacker to potentially execute arbitrary code with elevated privileges, compromising the confidentiality, integrity, and availability of the affected device. Despite early notification, Linksys has not responded or issued patches, and the exploit code has been publicly disclosed, increasing the risk of exploitation. The vulnerability's CVSS 4.0 score is 8.7 (high), reflecting its critical nature and ease of exploitation. The absence of vendor patches and public exploit availability make this a significant threat to networks relying on these devices for Wi-Fi extension and connectivity.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for enterprises and small-to-medium businesses that deploy Linksys range extenders to improve wireless coverage. Successful exploitation can lead to full device compromise, enabling attackers to intercept or manipulate network traffic, launch further attacks within the internal network, or disrupt network availability. Given that these devices often operate at network edges or in less monitored segments, attackers could establish persistent footholds or pivot to more critical infrastructure. The lack of vendor response and patches increases the window of exposure. Additionally, organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) face heightened risks of regulatory non-compliance and reputational damage if exploited. The remote, unauthenticated nature of the exploit means attackers can target vulnerable devices over the internet or local networks without user interaction, amplifying the threat landscape across European networks.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls and device isolation. Organizations should: 1) Identify and inventory all affected Linksys range extenders within their environment. 2) Restrict access to the management interfaces of these devices by implementing strict firewall rules limiting access to trusted IP addresses only. 3) Segment the network to isolate vulnerable extenders from critical systems and sensitive data. 4) Monitor network traffic for anomalous requests to /goform/qosClassifier or unusual port scanning activities targeting these devices. 5) Disable or restrict QoS features if possible, to reduce attack surface. 6) Where feasible, replace vulnerable devices with models from vendors with active security support. 7) Engage with Linksys support channels persistently to seek firmware updates or official patches. 8) Employ intrusion detection/prevention systems (IDS/IPS) signatures that detect exploitation attempts targeting this vulnerability. These steps go beyond generic advice by focusing on compensating controls and proactive detection in the absence of vendor patches.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-23T15:38:01.385Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ab2d15ad5a09ad003387fe
Added to database: 8/24/2025, 3:17:41 PM
Last enriched: 8/24/2025, 3:32:51 PM
Last updated: 8/24/2025, 5:50:57 PM
Views: 3
Related Threats
CVE-2025-9394: Use After Free in PoDoFo
MediumCVE-2025-9393: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9391: SQL Injection in Bjskzy Zhiyou ERP
MediumCVE-2025-9390: Buffer Overflow in vim
MediumCVE-2025-9389: Memory Corruption in vim
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.