Stack-Based Buffer Overflow in Linksys Wireless Routers
CVE-2025-9249
Key Information:
Badges
What is CVE-2025-9249?
A stack-based buffer overflow vulnerability exists in the Linksys RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 routers due to improper handling of input parameters in the DHCPReserveAddGroup function. This flaw allows an attacker to exploit it remotely by sending crafted requests that manipulate parameters such as enable_group, name_group, ip_group, and mac_group. The potential exploitation of this vulnerability can lead to unauthorized access and compromise the device's integrity. The issue has been disclosed publicly, and the vendor has not responded to early notifications regarding the vulnerability.
Affected Version(s)
RE6250 1.0.013.001
RE6250 1.0.04.001
RE6250 1.0.04.002
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved