Skip to main content

CVE-2025-9392: Stack-based Buffer Overflow in Linksys RE6250

High
VulnerabilityCVE-2025-9392cvecve-2025-9392
Published: Sun Aug 24 2025 (08/24/2025, 15:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6250

Description

A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function qosClassifier of the file /goform/qosClassifier. Such manipulation of the argument dir/sFromPort/sToPort/dFromPort/dToPort/protocol/layer7/dscp/remark_dscp leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/24/2025, 15:32:51 UTC

Technical Analysis

CVE-2025-9392 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the qosClassifier function within the /goform/qosClassifier endpoint, where improper handling and validation of parameters such as dir, sFromPort, sToPort, dFromPort, dToPort, protocol, layer7, dscp, and remark_dscp can lead to a stack-based buffer overflow. This flaw can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability allows an attacker to potentially execute arbitrary code with elevated privileges, compromising the confidentiality, integrity, and availability of the affected device. Despite early notification, Linksys has not responded or issued patches, and the exploit code has been publicly disclosed, increasing the risk of exploitation. The vulnerability's CVSS 4.0 score is 8.7 (high), reflecting its critical nature and ease of exploitation. The absence of vendor patches and public exploit availability make this a significant threat to networks relying on these devices for Wi-Fi extension and connectivity.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for enterprises and small-to-medium businesses that deploy Linksys range extenders to improve wireless coverage. Successful exploitation can lead to full device compromise, enabling attackers to intercept or manipulate network traffic, launch further attacks within the internal network, or disrupt network availability. Given that these devices often operate at network edges or in less monitored segments, attackers could establish persistent footholds or pivot to more critical infrastructure. The lack of vendor response and patches increases the window of exposure. Additionally, organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) face heightened risks of regulatory non-compliance and reputational damage if exploited. The remote, unauthenticated nature of the exploit means attackers can target vulnerable devices over the internet or local networks without user interaction, amplifying the threat landscape across European networks.

Mitigation Recommendations

Immediate mitigation should focus on network-level controls and device isolation. Organizations should: 1) Identify and inventory all affected Linksys range extenders within their environment. 2) Restrict access to the management interfaces of these devices by implementing strict firewall rules limiting access to trusted IP addresses only. 3) Segment the network to isolate vulnerable extenders from critical systems and sensitive data. 4) Monitor network traffic for anomalous requests to /goform/qosClassifier or unusual port scanning activities targeting these devices. 5) Disable or restrict QoS features if possible, to reduce attack surface. 6) Where feasible, replace vulnerable devices with models from vendors with active security support. 7) Engage with Linksys support channels persistently to seek firmware updates or official patches. 8) Employ intrusion detection/prevention systems (IDS/IPS) signatures that detect exploitation attempts targeting this vulnerability. These steps go beyond generic advice by focusing on compensating controls and proactive detection in the absence of vendor patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-23T15:38:01.385Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ab2d15ad5a09ad003387fe

Added to database: 8/24/2025, 3:17:41 PM

Last enriched: 8/24/2025, 3:32:51 PM

Last updated: 8/24/2025, 5:50:57 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats