CVE-2025-9392: Stack-based Buffer Overflow in Linksys RE6250
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function qosClassifier of the file /goform/qosClassifier. Such manipulation of the argument dir/sFromPort/sToPort/dFromPort/dToPort/protocol/layer7/dscp/remark_dscp leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9392 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, specifically the RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, across firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the qosClassifier function within the /goform/qosClassifier endpoint, which processes parameters such as dir, sFromPort, sToPort, dFromPort, dToPort, protocol, layer7, dscp, and remark_dscp. Improper handling and insufficient bounds checking of these input parameters allow an attacker to craft malicious requests that trigger a stack-based buffer overflow. This overflow can lead to arbitrary code execution or denial of service conditions. The vulnerability can be exploited remotely without requiring user interaction or authentication, making it particularly dangerous. The CVSS 4.0 base score is 8.7, reflecting the ease of remote exploitation (Attack Vector: Network), low attack complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability with high impact, as successful exploitation could allow attackers to take control of the device or disrupt network services. The vendor, Linksys, was contacted early but has not responded or issued patches, and no official patches or mitigations have been published yet. Although no known exploits have been observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation by threat actors.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises and service providers relying on Linksys range extenders to enhance wireless network coverage. Exploitation could lead to full compromise of the affected devices, enabling attackers to intercept or manipulate network traffic, pivot into internal networks, or cause network outages. This is particularly critical for organizations with remote or branch offices using these devices, as attackers can exploit the vulnerability remotely over the internet or internal networks. The lack of vendor response and patches increases exposure time, raising the likelihood of exploitation. Critical infrastructure sectors, financial institutions, healthcare providers, and government agencies in Europe that depend on secure and reliable network connectivity could face data breaches, operational disruptions, and reputational damage. Additionally, compromised devices could be leveraged as footholds for broader attacks or as part of botnets targeting European networks.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately conduct comprehensive inventories to identify the presence of affected Linksys range extender models and firmware versions. Network segmentation should be enforced to isolate these devices from sensitive internal networks and critical assets. Access to the management interfaces, especially the /goform/qosClassifier endpoint, should be restricted using firewall rules or network access control lists to limit exposure to trusted administrators only. Intrusion detection and prevention systems (IDS/IPS) should be configured to monitor and block suspicious traffic patterns targeting the vulnerable parameters. Organizations should consider disabling QoS features or the vulnerable service endpoints if feasible. Where possible, replace affected devices with alternative models or vendors that have issued security updates. Continuous monitoring for unusual device behavior or network anomalies is essential. Finally, organizations should maintain close watch on vendor communications for any forthcoming patches and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-9392: Stack-based Buffer Overflow in Linksys RE6250
Description
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function qosClassifier of the file /goform/qosClassifier. Such manipulation of the argument dir/sFromPort/sToPort/dFromPort/dToPort/protocol/layer7/dscp/remark_dscp leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9392 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, specifically the RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, across firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the qosClassifier function within the /goform/qosClassifier endpoint, which processes parameters such as dir, sFromPort, sToPort, dFromPort, dToPort, protocol, layer7, dscp, and remark_dscp. Improper handling and insufficient bounds checking of these input parameters allow an attacker to craft malicious requests that trigger a stack-based buffer overflow. This overflow can lead to arbitrary code execution or denial of service conditions. The vulnerability can be exploited remotely without requiring user interaction or authentication, making it particularly dangerous. The CVSS 4.0 base score is 8.7, reflecting the ease of remote exploitation (Attack Vector: Network), low attack complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability with high impact, as successful exploitation could allow attackers to take control of the device or disrupt network services. The vendor, Linksys, was contacted early but has not responded or issued patches, and no official patches or mitigations have been published yet. Although no known exploits have been observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation by threat actors.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises and service providers relying on Linksys range extenders to enhance wireless network coverage. Exploitation could lead to full compromise of the affected devices, enabling attackers to intercept or manipulate network traffic, pivot into internal networks, or cause network outages. This is particularly critical for organizations with remote or branch offices using these devices, as attackers can exploit the vulnerability remotely over the internet or internal networks. The lack of vendor response and patches increases exposure time, raising the likelihood of exploitation. Critical infrastructure sectors, financial institutions, healthcare providers, and government agencies in Europe that depend on secure and reliable network connectivity could face data breaches, operational disruptions, and reputational damage. Additionally, compromised devices could be leveraged as footholds for broader attacks or as part of botnets targeting European networks.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately conduct comprehensive inventories to identify the presence of affected Linksys range extender models and firmware versions. Network segmentation should be enforced to isolate these devices from sensitive internal networks and critical assets. Access to the management interfaces, especially the /goform/qosClassifier endpoint, should be restricted using firewall rules or network access control lists to limit exposure to trusted administrators only. Intrusion detection and prevention systems (IDS/IPS) should be configured to monitor and block suspicious traffic patterns targeting the vulnerable parameters. Organizations should consider disabling QoS features or the vulnerable service endpoints if feasible. Where possible, replace affected devices with alternative models or vendors that have issued security updates. Continuous monitoring for unusual device behavior or network anomalies is essential. Finally, organizations should maintain close watch on vendor communications for any forthcoming patches and apply them promptly once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-23T15:38:01.385Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ab2d15ad5a09ad003387fe
Added to database: 8/24/2025, 3:17:41 PM
Last enriched: 9/1/2025, 1:06:34 AM
Last updated: 10/7/2025, 10:51:57 AM
Views: 95
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11387: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-11386: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-11385: Buffer Overflow in Tenda AC20
HighCVE-2025-11360: Cross Site Scripting in jakowenko double-take
MediumCVE-2025-11359: SQL Injection in code-projects Simple Banking System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.