Skip to main content

CVE-2025-9481: Stack-based Buffer Overflow in Linksys RE6250

High
VulnerabilityCVE-2025-9481cvecve-2025-9481
Published: Tue Aug 26 2025 (08/26/2025, 13:32:09 UTC)
Source: CVE Database V5
Vendor/Project: Linksys
Product: RE6250

Description

A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function setIpv6 of the file /goform/setIpv6. The manipulation of the argument tunrd_Prefix leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/26/2025, 14:03:08 UTC

Technical Analysis

CVE-2025-9481 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, across firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the setIpv6 function within the /goform/setIpv6 endpoint. Specifically, the flaw is triggered by manipulating the tunrd_Prefix argument, which leads to a stack-based buffer overflow condition. This type of vulnerability can allow an attacker to overwrite critical memory regions on the device, potentially enabling arbitrary code execution or causing denial of service. The vulnerability is remotely exploitable without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS 4.0 base score is 8.7, reflecting a high severity due to the ease of exploitation and the potential for significant impact on confidentiality, integrity, and availability. Although the vendor was notified early, no response or patch has been issued, and public exploit code has been disclosed, increasing the risk of exploitation. The vulnerability affects the core networking functionality related to IPv6 configuration, which is critical for device operation and network security. Exploitation could allow attackers to gain control over the device, intercept or manipulate network traffic, or disrupt network connectivity.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for enterprises and service providers relying on Linksys range extenders to enhance wireless coverage. Compromise of these devices can lead to unauthorized network access, interception of sensitive data, lateral movement within internal networks, and disruption of network services. Given the remote exploitability without authentication, attackers can target vulnerable devices over the internet or internal networks. This is particularly concerning for organizations with distributed networks or remote offices using these extenders. The lack of vendor response and patches increases the window of exposure, potentially leading to widespread exploitation. Critical infrastructure, government agencies, and businesses handling sensitive data in Europe could face confidentiality breaches, operational disruptions, and reputational damage if attackers leverage this flaw. Additionally, compromised devices could be enlisted into botnets or used as pivot points for further attacks, amplifying the threat landscape.

Mitigation Recommendations

Immediate mitigation steps include isolating affected Linksys extenders from critical network segments and disabling IPv6 configuration via the vulnerable endpoint if possible. Network administrators should monitor traffic to and from these devices for unusual activity, especially requests targeting /goform/setIpv6. Deploying network-level protections such as Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block exploit attempts targeting the tunrd_Prefix parameter is recommended. Organizations should inventory all Linksys extenders to identify affected models and firmware versions and plan for device replacement or firmware rollback if no patches are available. Employ network segmentation to limit exposure of vulnerable devices and restrict management interfaces to trusted networks only. Regularly update network device inventories and monitor vendor communications for any forthcoming patches or advisories. In the absence of vendor patches, consider deploying compensating controls such as VPNs or secure tunnels to protect management traffic and reduce attack surface. Finally, conduct security awareness training to inform IT staff about this vulnerability and encourage vigilance for related indicators of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-26T07:35:43.588Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68adbb04ad5a09ad00589359

Added to database: 8/26/2025, 1:47:48 PM

Last enriched: 8/26/2025, 2:03:08 PM

Last updated: 8/26/2025, 2:47:47 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats