Stack-Based Buffer Overflow in Linksys Wireless Extenders
CVE-2025-9252
Key Information:
Badges
What is CVE-2025-9252?
CVE-2025-9252 is a critical vulnerability found in several models of Linksys Wireless Extenders, specifically the RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000. The flaw resides in the function responsible for handling password alerts in the device's firmware, which, when manipulated, can lead to a stack-based buffer overflow. This vulnerability allows attackers to exploit the device remotely, potentially compromising the integrity and availability of network resources. Given that these extenders are used to enhance wireless connectivity in homes and businesses, the exploitation of this flaw could allow unauthorized entities to gain control over the network, leading to a significant decrease in both security and performance.
Potential impact of CVE-2025-9252
-
Unauthorized Access: The stack-based buffer overflow can enable attackers to execute arbitrary code, granting them control over the affected device. This access could allow attackers to manipulate network configurations, intercept internet traffic, or deploy malicious software.
-
Network Compromise: With control over a wireless extender, threat actors can extend their reach to the entire network. This could result in the infiltration of other connected devices, leading to a broader scope of data breaches or system manipulations.
-
Denial of Service: Exploiting this vulnerability may result in the device becoming unresponsive or crashing, disrupting the wireless service for all connected users. This downtime can severely impact operations, especially in a business environment where reliable network connectivity is crucial.
Affected Version(s)
RE6250 1.0.013.001
RE6250 1.0.04.001
RE6250 1.0.04.002
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐
Vulnerability started trending
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved