Stack-Based Buffer Overflow in Linksys Wireless Extenders
CVE-2025-9252

8.7HIGH

Key Information:

Vendor

Linksys

Status
Vendor
CVE Published:
20 August 2025

Badges

๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 4,500๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2025-9252?

CVE-2025-9252 is a critical vulnerability found in several models of Linksys Wireless Extenders, specifically the RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000. The flaw resides in the function responsible for handling password alerts in the device's firmware, which, when manipulated, can lead to a stack-based buffer overflow. This vulnerability allows attackers to exploit the device remotely, potentially compromising the integrity and availability of network resources. Given that these extenders are used to enhance wireless connectivity in homes and businesses, the exploitation of this flaw could allow unauthorized entities to gain control over the network, leading to a significant decrease in both security and performance.

Potential impact of CVE-2025-9252

  1. Unauthorized Access: The stack-based buffer overflow can enable attackers to execute arbitrary code, granting them control over the affected device. This access could allow attackers to manipulate network configurations, intercept internet traffic, or deploy malicious software.

  2. Network Compromise: With control over a wireless extender, threat actors can extend their reach to the entire network. This could result in the infiltration of other connected devices, leading to a broader scope of data breaches or system manipulations.

  3. Denial of Service: Exploiting this vulnerability may result in the device becoming unresponsive or crashing, disrupting the wireless service for all connected users. This downtime can severely impact operations, especially in a business environment where reliable network connectivity is crucial.

Affected Version(s)

RE6250 1.0.013.001

RE6250 1.0.04.001

RE6250 1.0.04.002

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

pjqwudi (VulDB User)
.
CVE-2025-9252 : Stack-Based Buffer Overflow in Linksys Wireless Extenders