Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-9248


A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The impacted element is the function RP_pingGatewayByBBS of the file /goform/RP_pingGatewayByBBS. The manipulation of the argument ssidhex results in stack-based buffer overflow. The attack may be performed from a remote location. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.


Published

2025-08-20T21:15:32.630

Last Modified

2025-09-02T18:22:42.417

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-119
    CWE-121

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linksys re6500_firmware 1.0.013.001 Yes
Hardware linksys re6500 - No
Operating System linksys re6250_firmware 1.0.04.001 Yes
Hardware linksys re6250 - No
Operating System linksys re6300_firmware 1.2.07.001 Yes
Hardware linksys re6300 - No
Operating System linksys re6350_firmware 1.0.04.001 Yes
Hardware linksys re6350 - No
Operating System linksys re7000_firmware 1.1.05.003 Yes
Hardware linksys re7000 - No
Operating System linksys re9000_firmware 1.0.04.002 Yes
Hardware linksys re9000 - No

References