Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9392: Stack-based Buffer Overflow in Linksys RE6250

0
High
VulnerabilityCVE-2025-9392cvecve-2025-9392
Published: Sun Aug 24 2025 (08/24/2025, 15:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6250

Description

A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function qosClassifier of the file /goform/qosClassifier. Such manipulation of the argument dir/sFromPort/sToPort/dFromPort/dToPort/protocol/layer7/dscp/remark_dscp leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/01/2025, 01:06:34 UTC

Technical Analysis

CVE-2025-9392 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, specifically the RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, across firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the qosClassifier function within the /goform/qosClassifier endpoint, which processes parameters such as dir, sFromPort, sToPort, dFromPort, dToPort, protocol, layer7, dscp, and remark_dscp. Improper handling and insufficient bounds checking of these input parameters allow an attacker to craft malicious requests that trigger a stack-based buffer overflow. This overflow can lead to arbitrary code execution or denial of service conditions. The vulnerability can be exploited remotely without requiring user interaction or authentication, making it particularly dangerous. The CVSS 4.0 base score is 8.7, reflecting the ease of remote exploitation (Attack Vector: Network), low attack complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability with high impact, as successful exploitation could allow attackers to take control of the device or disrupt network services. The vendor, Linksys, was contacted early but has not responded or issued patches, and no official patches or mitigations have been published yet. Although no known exploits have been observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation by threat actors.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and service providers relying on Linksys range extenders to enhance wireless network coverage. Exploitation could lead to full compromise of the affected devices, enabling attackers to intercept or manipulate network traffic, pivot into internal networks, or cause network outages. This is particularly critical for organizations with remote or branch offices using these devices, as attackers can exploit the vulnerability remotely over the internet or internal networks. The lack of vendor response and patches increases exposure time, raising the likelihood of exploitation. Critical infrastructure sectors, financial institutions, healthcare providers, and government agencies in Europe that depend on secure and reliable network connectivity could face data breaches, operational disruptions, and reputational damage. Additionally, compromised devices could be leveraged as footholds for broader attacks or as part of botnets targeting European networks.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately conduct comprehensive inventories to identify the presence of affected Linksys range extender models and firmware versions. Network segmentation should be enforced to isolate these devices from sensitive internal networks and critical assets. Access to the management interfaces, especially the /goform/qosClassifier endpoint, should be restricted using firewall rules or network access control lists to limit exposure to trusted administrators only. Intrusion detection and prevention systems (IDS/IPS) should be configured to monitor and block suspicious traffic patterns targeting the vulnerable parameters. Organizations should consider disabling QoS features or the vulnerable service endpoints if feasible. Where possible, replace affected devices with alternative models or vendors that have issued security updates. Continuous monitoring for unusual device behavior or network anomalies is essential. Finally, organizations should maintain close watch on vendor communications for any forthcoming patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-23T15:38:01.385Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ab2d15ad5a09ad003387fe

Added to database: 8/24/2025, 3:17:41 PM

Last enriched: 9/1/2025, 1:06:34 AM

Last updated: 10/7/2025, 10:51:57 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats