Search criteria
143 vulnerabilities by linksys
CVE-2025-9575 (GCVE-0-2025-9575)
Vulnerability from cvelistv5 – Published: 2025-08-28 18:02 – Updated: 2025-08-28 18:31
VLAI?
Summary
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function cgiMain of the file /cgi-bin/upload.cgi. Executing manipulation of the argument filename can lead to os command injection. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
Bond_yes (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9575",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-28T18:31:02.503516Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T18:31:06.309Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_13/13.md#poc"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_13/13.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Bond_yes (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function cgiMain of the file /cgi-bin/upload.cgi. Executing manipulation of the argument filename can lead to os command injection. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 entdeckt. Es geht hierbei um die Funktion cgiMain der Datei /cgi-bin/upload.cgi. Die Manipulation des Arguments filename f\u00fchrt zu os command injection. Der Angriff kann \u00fcber das Netzwerk erfolgen. Die Ausnutzung wurde ver\u00f6ffentlicht und kann verwendet werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T18:02:06.116Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321689 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 upload.cgi cgiMain os command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321689"
},
{
"name": "VDB-321689 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321689"
},
{
"name": "Submit #634840 | Linksys E6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.634840"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_13/13.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_13/13.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-28T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-28T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-28T13:05:52.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 upload.cgi cgiMain os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9575",
"datePublished": "2025-08-28T18:02:06.116Z",
"dateReserved": "2025-08-28T11:00:44.364Z",
"dateUpdated": "2025-08-28T18:31:06.309Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9528 (GCVE-0-2025-9528)
Vulnerability from cvelistv5 – Published: 2025-08-27 13:02 – Updated: 2025-08-27 13:26
VLAI?
Summary
A vulnerability was determined in Linksys E1700 1.0.0.4.003. This vulnerability affects the function systemCommand of the file /goform/systemCommand. Executing manipulation of the argument command can lead to os command injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Credits
Bond_yes (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9528",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-27T13:26:41.277837Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T13:26:50.938Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "E1700",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.0.4.003"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Bond_yes (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was determined in Linksys E1700 1.0.0.4.003. This vulnerability affects the function systemCommand of the file /goform/systemCommand. Executing manipulation of the argument command can lead to os command injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in Linksys E1700 1.0.0.4.003 entdeckt. Es geht hierbei um die Funktion systemCommand der Datei /goform/systemCommand. Durch das Manipulieren des Arguments command mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5.8,
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T13:02:08.736Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321545 | Linksys E1700 systemCommand os command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321545"
},
{
"name": "VDB-321545 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321545"
},
{
"name": "Submit #634827 | Linksys E1700 E1700(1.0.0.4.003) OS Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.634827"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_61/61.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_61/61.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-27T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-27T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-27T09:37:05.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys E1700 systemCommand os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9528",
"datePublished": "2025-08-27T13:02:08.736Z",
"dateReserved": "2025-08-27T05:43:16.297Z",
"dateUpdated": "2025-08-27T13:26:50.938Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9527 (GCVE-0-2025-9527)
Vulnerability from cvelistv5 – Published: 2025-08-27 13:02 – Updated: 2025-08-27 13:28
VLAI?
Summary
A vulnerability was found in Linksys E1700 1.0.0.4.003. This affects the function QoSSetup of the file /goform/QoSSetup. Performing manipulation of the argument ack_policy results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Credits
Bond_yes (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9527",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-27T13:27:51.672873Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T13:28:00.394Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "E1700",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.0.4.003"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Bond_yes (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Linksys E1700 1.0.0.4.003. This affects the function QoSSetup of the file /goform/QoSSetup. Performing manipulation of the argument ack_policy results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in Linksys E1700 1.0.0.4.003 gefunden. Es geht um die Funktion QoSSetup der Datei /goform/QoSSetup. Mittels Manipulieren des Arguments ack_policy mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Die Ausnutzung wurde ver\u00f6ffentlicht und kann verwendet werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T13:02:06.341Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321544 | Linksys E1700 QoSSetup stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321544"
},
{
"name": "VDB-321544 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321544"
},
{
"name": "Submit #634826 | Linksys E1700 E1700(1.0.0.4.003) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.634826"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_60/60.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_60/60.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-27T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-27T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-27T09:37:01.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys E1700 QoSSetup stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9527",
"datePublished": "2025-08-27T13:02:06.341Z",
"dateReserved": "2025-08-27T05:43:13.651Z",
"dateUpdated": "2025-08-27T13:28:00.394Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9526 (GCVE-0-2025-9526)
Vulnerability from cvelistv5 – Published: 2025-08-27 12:32 – Updated: 2025-08-27 13:18
VLAI?
Summary
A vulnerability has been found in Linksys E1700 1.0.0.4.003. Affected by this issue is the function setSysAdm of the file /goform/setSysAdm. Such manipulation of the argument rm_port leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Credits
Bond_yes (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9526",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-27T13:17:55.594019Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T13:18:53.170Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "E1700",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.0.4.003"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Bond_yes (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Linksys E1700 1.0.0.4.003. Affected by this issue is the function setSysAdm of the file /goform/setSysAdm. Such manipulation of the argument rm_port leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys E1700 1.0.0.4.003 ist eine Schwachstelle entdeckt worden. Betroffen hiervon ist die Funktion setSysAdm der Datei /goform/setSysAdm. Mittels dem Manipulieren des Arguments rm_port mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgef\u00fchrt werden. Der Exploit ist \u00f6ffentlich verf\u00fcgbar und k\u00f6nnte genutzt werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T12:32:09.160Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321543 | Linksys E1700 setSysAdm stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321543"
},
{
"name": "VDB-321543 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321543"
},
{
"name": "Submit #634825 | Linksys E1700 E1700(1.0.0.4.003) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.634825"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_59/59.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_59/59.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-27T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-27T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-27T09:36:57.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys E1700 setSysAdm stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9526",
"datePublished": "2025-08-27T12:32:09.160Z",
"dateReserved": "2025-08-27T05:43:10.953Z",
"dateUpdated": "2025-08-27T13:18:53.170Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9525 (GCVE-0-2025-9525)
Vulnerability from cvelistv5 – Published: 2025-08-27 12:32 – Updated: 2025-08-27 13:20
VLAI?
Summary
A flaw has been found in Linksys E1700 1.0.0.4.003. Affected by this vulnerability is the function setWan of the file /goform/setWan. This manipulation of the argument DeviceName/lanIp causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Credits
Bond_yes (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9525",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-27T13:20:37.653502Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T13:20:56.576Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "E1700",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.0.4.003"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Bond_yes (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw has been found in Linksys E1700 1.0.0.4.003. Affected by this vulnerability is the function setWan of the file /goform/setWan. This manipulation of the argument DeviceName/lanIp causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys E1700 1.0.0.4.003 wurde eine Schwachstelle gefunden. Betroffen davon ist die Funktion setWan der Datei /goform/setWan. Durch Manipulation des Arguments DeviceName/lanIp mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Die Schwachstelle wurde \u00f6ffentlich offengelegt und k\u00f6nnte ausgenutzt werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T12:32:07.243Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321542 | Linksys E1700 setWan stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321542"
},
{
"name": "VDB-321542 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321542"
},
{
"name": "Submit #634824 | Linksys E1700 E1700(1.0.0.4.003) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.634824"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_58/58.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_58/58.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-27T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-27T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-27T09:36:52.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys E1700 setWan stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9525",
"datePublished": "2025-08-27T12:32:07.243Z",
"dateReserved": "2025-08-27T05:43:01.318Z",
"dateUpdated": "2025-08-27T13:20:56.576Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9483 (GCVE-0-2025-9483)
Vulnerability from cvelistv5 – Published: 2025-08-26 14:02 – Updated: 2025-08-26 15:01
VLAI?
Summary
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function singlePortForwardAdd of the file /goform/singlePortForwardAdd. This manipulation of the argument ruleName/schedule/inboundFilter causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
Bond_yes (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9483",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-26T15:01:54.282758Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-26T15:01:59.378Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_37/37.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_37/37.md#poc"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Bond_yes (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function singlePortForwardAdd of the file /goform/singlePortForwardAdd. This manipulation of the argument ruleName/schedule/inboundFilter causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 wurde eine Schwachstelle gefunden. Betroffen davon ist die Funktion singlePortForwardAdd der Datei /goform/singlePortForwardAdd. Dank der Manipulation des Arguments ruleName/schedule/inboundFilter mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit ist \u00f6ffentlich verf\u00fcgbar und k\u00f6nnte genutzt werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-26T14:02:06.175Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321398 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 singlePortForwardAdd stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321398"
},
{
"name": "VDB-321398 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321398"
},
{
"name": "Submit #634823 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.634823"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_37/37.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_37/37.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-26T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-26T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-26T09:40:58.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 singlePortForwardAdd stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9483",
"datePublished": "2025-08-26T14:02:06.175Z",
"dateReserved": "2025-08-26T07:35:50.516Z",
"dateUpdated": "2025-08-26T15:01:59.378Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9482 (GCVE-0-2025-9482)
Vulnerability from cvelistv5 – Published: 2025-08-26 13:32 – Updated: 2025-08-26 14:42
VLAI?
Summary
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This impacts the function portRangeForwardAdd of the file /goform/portRangeForwardAdd. The manipulation of the argument ruleName/schedule/inboundFilter/TCPPorts/UDPPorts results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
Bond_yes (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9482",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-26T14:42:39.463898Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-26T14:42:43.140Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_36/36.md#poc"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_36/36.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Bond_yes (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This impacts the function portRangeForwardAdd of the file /goform/portRangeForwardAdd. The manipulation of the argument ruleName/schedule/inboundFilter/TCPPorts/UDPPorts results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 entdeckt. Betroffen ist die Funktion portRangeForwardAdd der Datei /goform/portRangeForwardAdd. Die Bearbeitung des Arguments ruleName/schedule/inboundFilter/TCPPorts/UDPPorts verursacht stack-based buffer overflow. Es ist m\u00f6glich, den Angriff aus der Ferne durchzuf\u00fchren. Die Schwachstelle wurde \u00f6ffentlich offengelegt und k\u00f6nnte ausgenutzt werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-26T13:32:11.752Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321397 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 portRangeForwardAdd stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321397"
},
{
"name": "VDB-321397 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321397"
},
{
"name": "Submit #634820 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.634820"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_36/36.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_36/36.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-26T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-26T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-26T09:40:57.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 portRangeForwardAdd stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9482",
"datePublished": "2025-08-26T13:32:11.752Z",
"dateReserved": "2025-08-26T07:35:47.510Z",
"dateUpdated": "2025-08-26T14:42:43.140Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9481 (GCVE-0-2025-9481)
Vulnerability from cvelistv5 – Published: 2025-08-26 13:32 – Updated: 2025-08-26 14:40
VLAI?
Summary
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function setIpv6 of the file /goform/setIpv6. The manipulation of the argument tunrd_Prefix leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
Bond_yes (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9481",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-26T14:40:53.873186Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-26T14:40:57.042Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_35/35.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_35/35.md#poc"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Bond_yes (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function setIpv6 of the file /goform/setIpv6. The manipulation of the argument tunrd_Prefix leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 gefunden. Hiervon betroffen ist die Funktion setIpv6 der Datei /goform/setIpv6. Die Ver\u00e4nderung des Parameters tunrd_Prefix resultiert in stack-based buffer overflow. Ein Angriff ist aus der Distanz m\u00f6glich. Der Exploit wurde der \u00d6ffentlichkeit bekannt gemacht und k\u00f6nnte verwendet werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-26T13:32:09.115Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321396 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setIpv6 stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321396"
},
{
"name": "VDB-321396 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321396"
},
{
"name": "Submit #634819 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.634819"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_35/35.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_35/35.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-26T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-26T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-26T09:40:55.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setIpv6 stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9481",
"datePublished": "2025-08-26T13:32:09.115Z",
"dateReserved": "2025-08-26T07:35:43.588Z",
"dateUpdated": "2025-08-26T14:40:57.042Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9393 (GCVE-0-2025-9393)
Vulnerability from cvelistv5 – Published: 2025-08-24 15:32 – Updated: 2025-08-25 17:20
VLAI?
Summary
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function addStaProfile of the file /goform/addStaProfile. Performing manipulation of the argument profile_name/Ssid/wep_key_1/wep_key_2/wep_key_3/wep_key_4/wep_key_length/wep_default_key/cipher/passphrase results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjq123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9393",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-25T17:20:34.217450Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T17:20:38.495Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_33/33.md#poc"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_33/33.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjq123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function addStaProfile of the file /goform/addStaProfile. Performing manipulation of the argument profile_name/Ssid/wep_key_1/wep_key_2/wep_key_3/wep_key_4/wep_key_length/wep_default_key/cipher/passphrase results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 wurde eine Schwachstelle gefunden. Es ist betroffen die Funktion addStaProfile der Datei /goform/addStaProfile. Durch Beeinflussen des Arguments profile_name/Ssid/wep_key_1/wep_key_2/wep_key_3/wep_key_4/wep_key_length/wep_default_key/cipher/passphrase mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Es ist m\u00f6glich, den Angriff aus der Ferne durchzuf\u00fchren. Der Exploit wurde der \u00d6ffentlichkeit bekannt gemacht und k\u00f6nnte verwendet werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-24T15:32:06.793Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321226 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 addStaProfile stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321226"
},
{
"name": "VDB-321226 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321226"
},
{
"name": "Submit #631538 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631538"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_33/33.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_33/33.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-23T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-23T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-23T17:43:20.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 addStaProfile stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9393",
"datePublished": "2025-08-24T15:32:06.793Z",
"dateReserved": "2025-08-23T15:38:12.812Z",
"dateUpdated": "2025-08-25T17:20:38.495Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9392 (GCVE-0-2025-9392)
Vulnerability from cvelistv5 – Published: 2025-08-24 15:02 – Updated: 2025-08-25 17:37
VLAI?
Summary
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function qosClassifier of the file /goform/qosClassifier. Such manipulation of the argument dir/sFromPort/sToPort/dFromPort/dToPort/protocol/layer7/dscp/remark_dscp leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjq123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9392",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-25T17:37:02.501767Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T17:37:11.597Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_32/32.md#poc"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_32/32.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjq123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function qosClassifier of the file /goform/qosClassifier. Such manipulation of the argument dir/sFromPort/sToPort/dFromPort/dToPort/protocol/layer7/dscp/remark_dscp leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 entdeckt. Betroffen ist die Funktion qosClassifier der Datei /goform/qosClassifier. Durch das Beeinflussen des Arguments dir/sFromPort/sToPort/dFromPort/dToPort/protocol/layer7/dscp/remark_dscp mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Ein Angriff ist aus der Distanz m\u00f6glich. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-24T15:02:06.506Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321225 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 qosClassifier stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321225"
},
{
"name": "VDB-321225 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321225"
},
{
"name": "Submit #631537 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631537"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_32/32.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_32/32.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-23T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-23T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-23T17:43:19.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 qosClassifier stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9392",
"datePublished": "2025-08-24T15:02:06.506Z",
"dateReserved": "2025-08-23T15:38:01.385Z",
"dateUpdated": "2025-08-25T17:37:11.597Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9363 (GCVE-0-2025-9363)
Vulnerability from cvelistv5 – Published: 2025-08-23 14:02 – Updated: 2025-08-25 18:04
VLAI?
Summary
A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function portTriggerManageRule of the file /goform/portTriggerManageRule. The manipulation of the argument triggerRuleName/schedule leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjq123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9363",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-25T18:03:42.311583Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T18:04:05.215Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjq123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function portTriggerManageRule of the file /goform/portTriggerManageRule. The manipulation of the argument triggerRuleName/schedule leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 wurde eine Schwachstelle gefunden. Es betrifft die Funktion portTriggerManageRule der Datei /goform/portTriggerManageRule. Durch Manipulation des Arguments triggerRuleName/schedule mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgef\u00fchrt werden. Der Exploit wurde der \u00d6ffentlichkeit bekannt gemacht und k\u00f6nnte verwendet werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-23T14:02:06.316Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321066 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 portTriggerManageRule stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321066"
},
{
"name": "VDB-321066 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321066"
},
{
"name": "Submit #631535 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631535"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_31/31.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_31/31.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-22T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-22T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-22T17:45:50.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 portTriggerManageRule stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9363",
"datePublished": "2025-08-23T14:02:06.316Z",
"dateReserved": "2025-08-22T15:40:33.495Z",
"dateUpdated": "2025-08-25T18:04:05.215Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9362 (GCVE-0-2025-9362)
Vulnerability from cvelistv5 – Published: 2025-08-23 13:32 – Updated: 2025-08-25 18:04
VLAI?
Summary
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The impacted element is the function urlFilterManageRule of the file /goform/urlFilterManageRule. Executing manipulation of the argument urlFilterRuleName/scheduleUrl/addURLFilter can lead to stack-based buffer overflow. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjq123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9362",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-25T18:04:39.250330Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T18:04:58.391Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjq123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The impacted element is the function urlFilterManageRule of the file /goform/urlFilterManageRule. Executing manipulation of the argument urlFilterRuleName/scheduleUrl/addURLFilter can lead to stack-based buffer overflow. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 entdeckt. Betroffen davon ist die Funktion urlFilterManageRule der Datei /goform/urlFilterManageRule. Durch die Manipulation des Arguments urlFilterRuleName/scheduleUrl/addURLFilter mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-23T13:32:06.431Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321065 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 urlFilterManageRule stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321065"
},
{
"name": "VDB-321065 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321065"
},
{
"name": "Submit #631534 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631534"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_30/30.md"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-22T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-22T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-22T17:45:49.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 urlFilterManageRule stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9362",
"datePublished": "2025-08-23T13:32:06.431Z",
"dateReserved": "2025-08-22T15:40:30.483Z",
"dateUpdated": "2025-08-25T18:04:58.391Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9361 (GCVE-0-2025-9361)
Vulnerability from cvelistv5 – Published: 2025-08-23 12:02 – Updated: 2025-08-25 18:05
VLAI?
Summary
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The affected element is the function ipRangeBlockManageRule of the file /goform/ipRangeBlockManageRule. Performing manipulation of the argument ipRangeBlockRuleName/scheduleIp/ipRangeBlockRuleIpAddr results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjq123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9361",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-25T18:05:32.916158Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T18:05:48.015Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjq123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The affected element is the function ipRangeBlockManageRule of the file /goform/ipRangeBlockManageRule. Performing manipulation of the argument ipRangeBlockRuleName/scheduleIp/ipRangeBlockRuleIpAddr results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 gefunden. Es ist betroffen die Funktion ipRangeBlockManageRule der Datei /goform/ipRangeBlockManageRule. Mit der Manipulation des Arguments ipRangeBlockRuleName/scheduleIp/ipRangeBlockRuleIpAddr mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Es ist m\u00f6glich, den Angriff aus der Ferne durchzuf\u00fchren. Die Ausnutzung wurde ver\u00f6ffentlicht und kann verwendet werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-23T12:02:06.669Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321064 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 ipRangeBlockManageRule stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321064"
},
{
"name": "VDB-321064 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321064"
},
{
"name": "Submit #631533 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631533"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_29/29.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_29/29.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-22T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-22T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-22T17:45:47.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 ipRangeBlockManageRule stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9361",
"datePublished": "2025-08-23T12:02:06.669Z",
"dateReserved": "2025-08-22T15:40:27.396Z",
"dateUpdated": "2025-08-25T18:05:48.015Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9360 (GCVE-0-2025-9360)
Vulnerability from cvelistv5 – Published: 2025-08-23 10:32 – Updated: 2025-08-25 18:07
VLAI?
Summary
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Impacted is the function accessControlAdd of the file /goform/accessControlAdd. Such manipulation of the argument ruleName/schedule leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjq123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9360",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-25T18:06:22.882035Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T18:07:05.251Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjq123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Impacted is the function accessControlAdd of the file /goform/accessControlAdd. Such manipulation of the argument ruleName/schedule leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 ist eine Schwachstelle entdeckt worden. Betroffen ist die Funktion accessControlAdd der Datei /goform/accessControlAdd. Dank Manipulation des Arguments ruleName/schedule mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Ein Angriff ist aus der Distanz m\u00f6glich. Der Exploit ist \u00f6ffentlich verf\u00fcgbar und k\u00f6nnte genutzt werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-23T10:32:06.525Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321063 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 accessControlAdd stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321063"
},
{
"name": "VDB-321063 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321063"
},
{
"name": "Submit #631532 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631532"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_28/28.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_28/28.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-22T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-22T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-22T17:45:45.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 accessControlAdd stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9360",
"datePublished": "2025-08-23T10:32:06.525Z",
"dateReserved": "2025-08-22T15:40:23.697Z",
"dateUpdated": "2025-08-25T18:07:05.251Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9359 (GCVE-0-2025-9359)
Vulnerability from cvelistv5 – Published: 2025-08-23 09:32 – Updated: 2025-08-25 18:13
VLAI?
Summary
A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. This manipulation of the argument ssidhex/pwd causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjq123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9359",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-25T18:09:34.716859Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T18:13:23.246Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjq123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. This manipulation of the argument ssidhex/pwd causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 wurde eine Schwachstelle gefunden. Hierbei geht es um die Funktion RP_checkCredentialsByBBS der Datei /goform/RP_checkCredentialsByBBS. Dank der Manipulation des Arguments ssidhex/pwd mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Die Schwachstelle wurde \u00f6ffentlich offengelegt und k\u00f6nnte ausgenutzt werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-23T09:32:06.481Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321062 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_checkCredentialsByBBS stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321062"
},
{
"name": "VDB-321062 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321062"
},
{
"name": "Submit #631531 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631531"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_27/27.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_27/27.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-22T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-22T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-22T17:45:44.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_checkCredentialsByBBS stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9359",
"datePublished": "2025-08-23T09:32:06.481Z",
"dateReserved": "2025-08-22T15:40:20.930Z",
"dateUpdated": "2025-08-25T18:13:23.246Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9358 (GCVE-0-2025-9358)
Vulnerability from cvelistv5 – Published: 2025-08-23 07:32 – Updated: 2025-08-25 18:14
VLAI?
Summary
A security flaw has been discovered in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function setSysAdm of the file /goform/setSysAdm. The manipulation of the argument admpasshint results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjq123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9358",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-25T18:13:59.042748Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T18:14:09.791Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjq123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A security flaw has been discovered in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function setSysAdm of the file /goform/setSysAdm. The manipulation of the argument admpasshint results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 entdeckt. Dabei geht es um die Funktion setSysAdm der Datei /goform/setSysAdm. Die Bearbeitung des Arguments admpasshint verursacht stack-based buffer overflow. Der Angriff l\u00e4sst sich \u00fcber das Netzwerk starten. Der Exploit wurde der \u00d6ffentlichkeit bekannt gemacht und k\u00f6nnte verwendet werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-23T07:32:06.304Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321061 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setSysAdm stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321061"
},
{
"name": "VDB-321061 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321061"
},
{
"name": "Submit #631530 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631530"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_26/26.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_26/26.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-22T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-22T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-22T17:45:43.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setSysAdm stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9358",
"datePublished": "2025-08-23T07:32:06.304Z",
"dateReserved": "2025-08-22T15:40:18.364Z",
"dateUpdated": "2025-08-25T18:14:09.791Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9357 (GCVE-0-2025-9357)
Vulnerability from cvelistv5 – Published: 2025-08-23 06:02 – Updated: 2025-08-25 18:19
VLAI?
Summary
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function langSwitchByBBS of the file /goform/langSwitchByBBS. The manipulation of the argument langSelectionOnly leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjq123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9357",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-25T18:18:31.836564Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T18:19:15.727Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjq123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function langSwitchByBBS of the file /goform/langSwitchByBBS. The manipulation of the argument langSelectionOnly leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 gefunden. Es geht dabei um die Funktion langSwitchByBBS der Datei /goform/langSwitchByBBS. Die Ver\u00e4nderung des Parameters langSelectionOnly resultiert in stack-based buffer overflow. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-23T06:02:05.980Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321060 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 langSwitchByBBS stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321060"
},
{
"name": "VDB-321060 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321060"
},
{
"name": "Submit #631529 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631529"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_25/25.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_25/25.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-22T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-22T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-22T17:45:42.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 langSwitchByBBS stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9357",
"datePublished": "2025-08-23T06:02:05.980Z",
"dateReserved": "2025-08-22T15:40:15.687Z",
"dateUpdated": "2025-08-25T18:19:15.727Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9356 (GCVE-0-2025-9356)
Vulnerability from cvelistv5 – Published: 2025-08-22 21:02 – Updated: 2025-08-26 14:29
VLAI?
Summary
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function inboundFilterAdd of the file /goform/inboundFilterAdd. Executing manipulation of the argument ruleName can lead to stack-based buffer overflow. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjq123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9356",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-26T14:29:51.608197Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-26T14:29:54.383Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_24/24.md#poc"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_24/24.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjq123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function inboundFilterAdd of the file /goform/inboundFilterAdd. Executing manipulation of the argument ruleName can lead to stack-based buffer overflow. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 ist eine Schwachstelle entdeckt worden. Es geht hierbei um die Funktion inboundFilterAdd der Datei /goform/inboundFilterAdd. Die Manipulation des Arguments ruleName f\u00fchrt zu stack-based buffer overflow. Der Angriff kann \u00fcber das Netzwerk erfolgen. Die Ausnutzung wurde ver\u00f6ffentlicht und kann verwendet werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-22T21:02:09.690Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321059 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 inboundFilterAdd stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321059"
},
{
"name": "VDB-321059 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321059"
},
{
"name": "Submit #631528 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631528"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_24/24.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_24/24.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-22T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-22T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-22T17:45:40.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 inboundFilterAdd stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9356",
"datePublished": "2025-08-22T21:02:09.690Z",
"dateReserved": "2025-08-22T15:40:13.173Z",
"dateUpdated": "2025-08-26T14:29:54.383Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9355 (GCVE-0-2025-9355)
Vulnerability from cvelistv5 – Published: 2025-08-22 21:02 – Updated: 2025-08-25 19:22
VLAI?
Summary
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this vulnerability is the function scheduleAdd of the file /goform/scheduleAdd. Performing manipulation of the argument ruleName results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjq123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9355",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-25T19:22:54.229574Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T19:22:58.106Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_23/23.md#poc"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_23/23.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjq123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this vulnerability is the function scheduleAdd of the file /goform/scheduleAdd. Performing manipulation of the argument ruleName results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 wurde eine Schwachstelle gefunden. Es geht um die Funktion scheduleAdd der Datei /goform/scheduleAdd. Durch Beeinflussen des Arguments ruleName mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit ist \u00f6ffentlich verf\u00fcgbar und k\u00f6nnte genutzt werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-22T21:02:07.395Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-321058 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 scheduleAdd stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.321058"
},
{
"name": "VDB-321058 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.321058"
},
{
"name": "Submit #631527 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631527"
},
{
"tags": [
"related"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_23/23.md"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_23/23.md#poc"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-22T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-22T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-22T17:45:38.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 scheduleAdd stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9355",
"datePublished": "2025-08-22T21:02:07.395Z",
"dateReserved": "2025-08-22T15:40:10.106Z",
"dateUpdated": "2025-08-25T19:22:58.106Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9253 (GCVE-0-2025-9253)
Vulnerability from cvelistv5 – Published: 2025-08-20 22:32 – Updated: 2025-08-21 14:47
VLAI?
Summary
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RP_doSpecifySiteSurvey of the file /goform/RP_doSpecifySiteSurvey. The manipulation of the argument ssidhex leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjqwudi (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9253",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T13:24:41.746941Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T14:47:34.751Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_22/22.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjqwudi (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RP_doSpecifySiteSurvey of the file /goform/RP_doSpecifySiteSurvey. The manipulation of the argument ssidhex leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 gefunden. Hiervon betroffen ist die Funktion RP_doSpecifySiteSurvey der Datei /goform/RP_doSpecifySiteSurvey. Mit der Manipulation des Arguments ssidhex mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Ein Angriff ist aus der Distanz m\u00f6glich. Die Ausnutzung wurde ver\u00f6ffentlicht und kann verwendet werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T22:32:06.493Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-320784 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_doSpecifySiteSurvey stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.320784"
},
{
"name": "VDB-320784 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.320784"
},
{
"name": "Submit #631526 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 Linksys Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631526"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_22/22.md"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-20T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-20T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-20T13:22:21.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_doSpecifySiteSurvey stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9253",
"datePublished": "2025-08-20T22:32:06.493Z",
"dateReserved": "2025-08-20T11:17:03.780Z",
"dateUpdated": "2025-08-21T14:47:34.751Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9252 (GCVE-0-2025-9252)
Vulnerability from cvelistv5 – Published: 2025-08-20 22:02 – Updated: 2025-08-21 14:47
VLAI?
Summary
A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this vulnerability is the function DisablePasswordAlertRedirect of the file /goform/DisablePasswordAlertRedirect. Executing manipulation of the argument hint can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjqwudi (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9252",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T14:42:15.791773Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T14:47:42.019Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_21/21.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjqwudi (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this vulnerability is the function DisablePasswordAlertRedirect of the file /goform/DisablePasswordAlertRedirect. Executing manipulation of the argument hint can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 ist eine Schwachstelle entdeckt worden. Davon betroffen ist die Funktion DisablePasswordAlertRedirect der Datei /goform/DisablePasswordAlertRedirect. Dank Manipulation des Arguments hint mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit ist \u00f6ffentlich verf\u00fcgbar und k\u00f6nnte genutzt werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T22:02:09.003Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-320783 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 DisablePasswordAlertRedirect stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.320783"
},
{
"name": "VDB-320783 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.320783"
},
{
"name": "Submit #631525 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631525"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_21/21.md"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-20T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-20T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-20T13:22:20.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 DisablePasswordAlertRedirect stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9252",
"datePublished": "2025-08-20T22:02:09.003Z",
"dateReserved": "2025-08-20T11:17:01.171Z",
"dateUpdated": "2025-08-21T14:47:42.019Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9251 (GCVE-0-2025-9251)
Vulnerability from cvelistv5 – Published: 2025-08-20 22:02 – Updated: 2025-08-21 14:47
VLAI?
Summary
A security flaw has been discovered in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function sta_wps_pin of the file /goform/sta_wps_pin. Performing manipulation of the argument Ssid results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjqwudi (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9251",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T13:25:21.864378Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T14:47:48.174Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_20/20.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjqwudi (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A security flaw has been discovered in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function sta_wps_pin of the file /goform/sta_wps_pin. Performing manipulation of the argument Ssid results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 wurde eine Schwachstelle gefunden. Hierbei betrifft es die Funktion sta_wps_pin der Datei /goform/sta_wps_pin. Dank der Manipulation des Arguments Ssid mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff l\u00e4sst sich \u00fcber das Netzwerk starten. Die Schwachstelle wurde \u00f6ffentlich offengelegt und k\u00f6nnte ausgenutzt werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T22:02:06.683Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-320782 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 sta_wps_pin stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.320782"
},
{
"name": "VDB-320782 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.320782"
},
{
"name": "Submit #631524 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631524"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_20/20.md"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-20T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-20T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-20T13:22:19.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 sta_wps_pin stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9251",
"datePublished": "2025-08-20T22:02:06.683Z",
"dateReserved": "2025-08-20T11:16:58.521Z",
"dateUpdated": "2025-08-21T14:47:48.174Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9250 (GCVE-0-2025-9250)
Vulnerability from cvelistv5 – Published: 2025-08-20 21:32 – Updated: 2025-08-21 14:48
VLAI?
Summary
A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This impacts the function setPWDbyBBS of the file /goform/setPWDbyBBS. Such manipulation of the argument hint leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjqwudi (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9250",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T14:40:59.766644Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T14:48:17.998Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_19/19.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjqwudi (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This impacts the function setPWDbyBBS of the file /goform/setPWDbyBBS. Such manipulation of the argument hint leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 entdeckt. Dabei betrifft es die Funktion setPWDbyBBS der Datei /goform/setPWDbyBBS. Die Bearbeitung des Arguments hint verursacht stack-based buffer overflow. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit wurde der \u00d6ffentlichkeit bekannt gemacht und k\u00f6nnte verwendet werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T21:32:06.411Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-320781 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setPWDbyBBS stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.320781"
},
{
"name": "VDB-320781 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.320781"
},
{
"name": "Submit #631523 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631523"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_19/19.md"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-20T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-20T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-20T13:22:17.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setPWDbyBBS stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9250",
"datePublished": "2025-08-20T21:32:06.411Z",
"dateReserved": "2025-08-20T11:16:55.733Z",
"dateUpdated": "2025-08-21T14:48:17.998Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9249 (GCVE-0-2025-9249)
Vulnerability from cvelistv5 – Published: 2025-08-20 21:02 – Updated: 2025-08-21 14:48
VLAI?
Summary
A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function DHCPReserveAddGroup of the file /goform/DHCPReserveAddGroup. This manipulation of the argument enable_group/name_group/ip_group/mac_group causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjqwudi (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9249",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T14:39:40.429601Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T14:48:24.205Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_18/18.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjqwudi (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function DHCPReserveAddGroup of the file /goform/DHCPReserveAddGroup. This manipulation of the argument enable_group/name_group/ip_group/mac_group causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 gefunden. Dies betrifft die Funktion DHCPReserveAddGroup der Datei /goform/DHCPReserveAddGroup. Die Ver\u00e4nderung des Parameters enable_group/name_group/ip_group/mac_group resultiert in stack-based buffer overflow. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T21:02:08.236Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-320780 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 DHCPReserveAddGroup stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.320780"
},
{
"name": "VDB-320780 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.320780"
},
{
"name": "Submit #631522 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631522"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_18/18.md"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-20T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-20T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-20T13:22:16.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 DHCPReserveAddGroup stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9249",
"datePublished": "2025-08-20T21:02:08.236Z",
"dateReserved": "2025-08-20T11:16:53.274Z",
"dateUpdated": "2025-08-21T14:48:24.205Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9248 (GCVE-0-2025-9248)
Vulnerability from cvelistv5 – Published: 2025-08-20 21:02 – Updated: 2025-08-21 14:48
VLAI?
Summary
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The impacted element is the function RP_pingGatewayByBBS of the file /goform/RP_pingGatewayByBBS. The manipulation of the argument ssidhex results in stack-based buffer overflow. The attack may be performed from a remote location. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjqwudi (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9248",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T13:26:45.432101Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T14:48:29.940Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_17/17.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjqwudi (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The impacted element is the function RP_pingGatewayByBBS of the file /goform/RP_pingGatewayByBBS. The manipulation of the argument ssidhex results in stack-based buffer overflow. The attack may be performed from a remote location. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 ist eine Schwachstelle entdeckt worden. Das betrifft die Funktion RP_pingGatewayByBBS der Datei /goform/RP_pingGatewayByBBS. Die Manipulation des Arguments ssidhex f\u00fchrt zu stack-based buffer overflow. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Die Ausnutzung wurde ver\u00f6ffentlicht und kann verwendet werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T21:02:06.039Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-320779 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_pingGatewayByBBS stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.320779"
},
{
"name": "VDB-320779 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.320779"
},
{
"name": "Submit #631521 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631521"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_17/17.md"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-20T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-20T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-20T13:22:15.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_pingGatewayByBBS stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9248",
"datePublished": "2025-08-20T21:02:06.039Z",
"dateReserved": "2025-08-20T11:16:50.673Z",
"dateUpdated": "2025-08-21T14:48:29.940Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9247 (GCVE-0-2025-9247)
Vulnerability from cvelistv5 – Published: 2025-08-20 20:32 – Updated: 2025-08-21 14:48
VLAI?
Summary
A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The affected element is the function setVlan of the file /goform/setVlan. The manipulation of the argument vlan_set leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjqwudi (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9247",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-21T13:27:08.733223Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-21T14:48:36.379Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_16/16.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjqwudi (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The affected element is the function setVlan of the file /goform/setVlan. The manipulation of the argument vlan_set leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 wurde eine Schwachstelle gefunden. Es betrifft die Funktion setVlan der Datei /goform/setVlan. Durch Beeinflussen des Arguments vlan_set mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgef\u00fchrt werden. Der Exploit ist \u00f6ffentlich verf\u00fcgbar und k\u00f6nnte genutzt werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T20:32:06.545Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-320778 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setVlan stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.320778"
},
{
"name": "VDB-320778 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.320778"
},
{
"name": "Submit #631520 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631520"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_16/16.md"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-20T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-20T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-20T13:22:13.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setVlan stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9247",
"datePublished": "2025-08-20T20:32:06.545Z",
"dateReserved": "2025-08-20T11:16:47.939Z",
"dateUpdated": "2025-08-21T14:48:36.379Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9246 (GCVE-0-2025-9246)
Vulnerability from cvelistv5 – Published: 2025-08-20 20:02 – Updated: 2025-08-20 20:27
VLAI?
Summary
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Impacted is the function check_port_conflict of the file /goform/check_port_conflict. Executing manipulation of the argument single_port_rule/port_range_rule can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjqwudi (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9246",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-20T20:26:45.522485Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T20:27:15.340Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjqwudi (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Impacted is the function check_port_conflict of the file /goform/check_port_conflict. Executing manipulation of the argument single_port_rule/port_range_rule can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 entdeckt. Betroffen davon ist die Funktion check_port_conflict der Datei /goform/check_port_conflict. Durch das Beeinflussen des Arguments single_port_rule/port_range_rule mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Die Schwachstelle wurde \u00f6ffentlich offengelegt und k\u00f6nnte ausgenutzt werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T20:02:08.900Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-320777 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 check_port_conflict stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.320777"
},
{
"name": "VDB-320777 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.320777"
},
{
"name": "Submit #631519 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631519"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_15/15.md"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-20T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-20T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-20T13:22:12.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 check_port_conflict stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9246",
"datePublished": "2025-08-20T20:02:08.900Z",
"dateReserved": "2025-08-20T11:16:45.220Z",
"dateUpdated": "2025-08-20T20:27:15.340Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9245 (GCVE-0-2025-9245)
Vulnerability from cvelistv5 – Published: 2025-08-20 20:02 – Updated: 2025-08-20 20:28
VLAI?
Summary
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function WPSSTAPINEnr of the file /goform/WPSSTAPINEnr. Performing manipulation of the argument ssid results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjqwudi (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9245",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-20T20:28:35.381245Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T20:28:52.492Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjqwudi (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function WPSSTAPINEnr of the file /goform/WPSSTAPINEnr. Performing manipulation of the argument ssid results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 gefunden. Es ist betroffen die Funktion WPSSTAPINEnr der Datei /goform/WPSSTAPINEnr. Durch Manipulieren des Arguments ssid mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Es ist m\u00f6glich, den Angriff aus der Ferne durchzuf\u00fchren. Der Exploit wurde der \u00d6ffentlichkeit bekannt gemacht und k\u00f6nnte verwendet werden."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 9,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Memory Corruption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T20:02:06.507Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-320776 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 WPSSTAPINEnr stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.320776"
},
{
"name": "VDB-320776 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.320776"
},
{
"name": "Submit #631518 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631518"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_14/14.md"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-20T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-20T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-20T13:22:11.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 WPSSTAPINEnr stack-based overflow"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9245",
"datePublished": "2025-08-20T20:02:06.507Z",
"dateReserved": "2025-08-20T11:16:42.337Z",
"dateUpdated": "2025-08-20T20:28:52.492Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9244 (GCVE-0-2025-9244)
Vulnerability from cvelistv5 – Published: 2025-08-20 19:32 – Updated: 2025-08-20 20:16
VLAI?
Summary
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function addStaticRoute of the file /goform/addStaticRoute. Such manipulation of the argument staticRoute_IP_setting/staticRoute_Netmask_setting/staticRoute_Gateway_setting/staticRoute_Metric_setting/staticRoute_destType_setting leads to os command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Linksys | RE6250 |
Affected:
1.0.013.001
Affected: 1.0.04.001 Affected: 1.0.04.002 Affected: 1.1.05.003 Affected: 1.2.07.001 |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Credits
pjqwudi (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9244",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-20T20:16:41.889009Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T20:16:52.674Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RE6250",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6300",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6350",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE6500",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE7000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
},
{
"product": "RE9000",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.0.013.001"
},
{
"status": "affected",
"version": "1.0.04.001"
},
{
"status": "affected",
"version": "1.0.04.002"
},
{
"status": "affected",
"version": "1.1.05.003"
},
{
"status": "affected",
"version": "1.2.07.001"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "pjqwudi (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function addStaticRoute of the file /goform/addStaticRoute. Such manipulation of the argument staticRoute_IP_setting/staticRoute_Netmask_setting/staticRoute_Gateway_setting/staticRoute_Metric_setting/staticRoute_destType_setting leads to os command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 ist eine Schwachstelle entdeckt worden. Betroffen ist die Funktion addStaticRoute der Datei /goform/addStaticRoute. Durch das Manipulieren des Arguments staticRoute_IP_setting/staticRoute_Netmask_setting/staticRoute_Gateway_setting/staticRoute_Metric_setting/staticRoute_destType_setting mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Ein Angriff ist aus der Distanz m\u00f6glich. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T19:32:08.090Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-320775 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 addStaticRoute os command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.320775"
},
{
"name": "VDB-320775 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.320775"
},
{
"name": "Submit #631517 | Linksys RE6500\u3001RE6250\u3001RE6300\u3001RE6350\u3001RE7000\u3001RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.631517"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_11/11.md"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-20T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-20T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-20T13:22:09.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 addStaticRoute os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9244",
"datePublished": "2025-08-20T19:32:08.090Z",
"dateReserved": "2025-08-20T11:16:31.303Z",
"dateUpdated": "2025-08-20T20:16:52.674Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-9146 (GCVE-0-2025-9146)
Vulnerability from cvelistv5 – Published: 2025-08-19 16:02 – Updated: 2025-08-19 19:20
VLAI?
Summary
A flaw has been found in Linksys E5600 1.1.0.26. The affected element is the function verify_gemtek_header of the file checkFw.sh of the component Firmware Handler. Executing manipulation can lead to risky cryptographic algorithm. The attack may be launched remotely. The attack requires a high level of complexity. The exploitability is described as difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Credits
IOT_Res (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9146",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-19T19:20:14.881097Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-19T19:20:28.216Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Linksys/E5600.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"Firmware Handler"
],
"product": "E5600",
"vendor": "Linksys",
"versions": [
{
"status": "affected",
"version": "1.1.0.26"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "IOT_Res (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw has been found in Linksys E5600 1.1.0.26. The affected element is the function verify_gemtek_header of the file checkFw.sh of the component Firmware Handler. Executing manipulation can lead to risky cryptographic algorithm. The attack may be launched remotely. The attack requires a high level of complexity. The exploitability is described as difficult. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in Linksys E5600 1.1.0.26 entdeckt. Betroffen davon ist die Funktion verify_gemtek_header der Datei checkFw.sh der Komponente Firmware Handler. Durch das Beeinflussen mit unbekannten Daten kann eine risky cryptographic algorithm-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Ein Angriff erfordert eine vergleichsweise hohe Komplexit\u00e4t. Sie ist schwierig auszunutzen."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 6.8,
"vectorString": "AV:N/AC:H/Au:M/C:C/I:C/A:C/E:ND/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-327",
"description": "Risky Cryptographic Algorithm",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-310",
"description": "Cryptographic Issues",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-19T16:02:06.364Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-320525 | Linksys E5600 Firmware checkFw.sh verify_gemtek_header risky encryption",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.320525"
},
{
"name": "VDB-320525 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.320525"
},
{
"name": "Submit #628642 | Linksys E5600 1.1.0.26 CWE-327 Use of a Broken or Risky Cryptographic Algorithm",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.628642"
},
{
"tags": [
"patch"
],
"url": "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Linksys/E5600.md"
},
{
"tags": [
"product"
],
"url": "https://www.linksys.com/"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-08-19T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-08-19T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-08-19T09:30:42.000Z",
"value": "VulDB entry last update"
}
],
"title": "Linksys E5600 Firmware checkFw.sh verify_gemtek_header risky encryption"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-9146",
"datePublished": "2025-08-19T16:02:06.364Z",
"dateReserved": "2025-08-19T07:25:39.833Z",
"dateUpdated": "2025-08-19T19:20:28.216Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}