CVE-2025-9483: Stack-based Buffer Overflow in Linksys RE6250
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function singlePortForwardAdd of the file /goform/singlePortForwardAdd. This manipulation of the argument ruleName/schedule/inboundFilter causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9483 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the function singlePortForwardAdd within the /goform/singlePortForwardAdd endpoint. This function improperly handles the input parameters ruleName, schedule, and inboundFilter, allowing an attacker to craft malicious input that causes a stack-based buffer overflow. This type of vulnerability can lead to arbitrary code execution or denial of service. The attack vector is remote network access, requiring no user interaction or prior authentication, which significantly increases the risk. The CVSS 4.0 score is 8.7 (high), reflecting the ease of exploitation (network attack vector, low complexity), no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although the vendor was notified early, no response or patch has been released, and an exploit has been published publicly, increasing the likelihood of exploitation. The vulnerability affects the core functionality of port forwarding configuration, which is commonly used in home and small office network setups to expose internal services externally. Exploitation could allow attackers to gain control over the device, pivot into internal networks, intercept or manipulate traffic, or disrupt network availability.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Linksys range extenders for network connectivity, this vulnerability poses a significant risk. Compromise of these devices can lead to unauthorized network access, data interception, and lateral movement within corporate or home networks. Given the remote exploitability without authentication, attackers can target vulnerable devices en masse, potentially creating botnets or launching further attacks against internal resources. The lack of vendor response and patches increases exposure time, raising the risk of widespread exploitation. Critical infrastructure or organizations with remote workers using these devices may face confidentiality breaches, integrity violations through traffic manipulation, and availability disruptions due to device crashes or reboots. The vulnerability could also be leveraged in supply chain attacks or as a foothold for ransomware campaigns targeting European entities.
Mitigation Recommendations
Immediate mitigation steps include isolating vulnerable Linksys range extenders from critical network segments and restricting remote management access to trusted IP addresses only. Network administrators should disable port forwarding features if not strictly necessary or replace affected devices with models from vendors with timely security support. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting the /goform/singlePortForwardAdd endpoint. Regularly scan networks for vulnerable device firmware versions and maintain an asset inventory to identify at-risk devices. Since no official patches are available, organizations should consider deploying network segmentation and strict firewall rules to limit exposure. Additionally, monitoring for unusual device behavior or network traffic anomalies can help detect exploitation attempts early. Engage with Linksys support channels to demand timely remediation and subscribe to vulnerability intelligence feeds for updates. Finally, educate users about the risks of using outdated network devices and encourage prompt hardware upgrades where feasible.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-9483: Stack-based Buffer Overflow in Linksys RE6250
Description
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function singlePortForwardAdd of the file /goform/singlePortForwardAdd. This manipulation of the argument ruleName/schedule/inboundFilter causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9483 is a high-severity stack-based buffer overflow vulnerability affecting multiple Linksys range extender models, including RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000, specifically in firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001. The vulnerability resides in the function singlePortForwardAdd within the /goform/singlePortForwardAdd endpoint. This function improperly handles the input parameters ruleName, schedule, and inboundFilter, allowing an attacker to craft malicious input that causes a stack-based buffer overflow. This type of vulnerability can lead to arbitrary code execution or denial of service. The attack vector is remote network access, requiring no user interaction or prior authentication, which significantly increases the risk. The CVSS 4.0 score is 8.7 (high), reflecting the ease of exploitation (network attack vector, low complexity), no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although the vendor was notified early, no response or patch has been released, and an exploit has been published publicly, increasing the likelihood of exploitation. The vulnerability affects the core functionality of port forwarding configuration, which is commonly used in home and small office network setups to expose internal services externally. Exploitation could allow attackers to gain control over the device, pivot into internal networks, intercept or manipulate traffic, or disrupt network availability.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Linksys range extenders for network connectivity, this vulnerability poses a significant risk. Compromise of these devices can lead to unauthorized network access, data interception, and lateral movement within corporate or home networks. Given the remote exploitability without authentication, attackers can target vulnerable devices en masse, potentially creating botnets or launching further attacks against internal resources. The lack of vendor response and patches increases exposure time, raising the risk of widespread exploitation. Critical infrastructure or organizations with remote workers using these devices may face confidentiality breaches, integrity violations through traffic manipulation, and availability disruptions due to device crashes or reboots. The vulnerability could also be leveraged in supply chain attacks or as a foothold for ransomware campaigns targeting European entities.
Mitigation Recommendations
Immediate mitigation steps include isolating vulnerable Linksys range extenders from critical network segments and restricting remote management access to trusted IP addresses only. Network administrators should disable port forwarding features if not strictly necessary or replace affected devices with models from vendors with timely security support. Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting the /goform/singlePortForwardAdd endpoint. Regularly scan networks for vulnerable device firmware versions and maintain an asset inventory to identify at-risk devices. Since no official patches are available, organizations should consider deploying network segmentation and strict firewall rules to limit exposure. Additionally, monitoring for unusual device behavior or network traffic anomalies can help detect exploitation attempts early. Engage with Linksys support channels to demand timely remediation and subscribe to vulnerability intelligence feeds for updates. Finally, educate users about the risks of using outdated network devices and encourage prompt hardware upgrades where feasible.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-26T07:35:50.516Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68adc20cad5a09ad0058d255
Added to database: 8/26/2025, 2:17:48 PM
Last enriched: 8/26/2025, 2:32:44 PM
Last updated: 8/26/2025, 3:17:47 PM
Views: 3
Actions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.