Severity
7.4HIGH
EPSS
0.2%
top 51.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 20

Description

A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Impacted is the function check_port_conflict of the file /goform/check_port_conflict. Executing manipulation of the argument single_port_rule/port_range_rule can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages12 packages

CVEListV5linksys/re62505 versions+4
CVEListV5linksys/re63005 versions+4
CVEListV5linksys/re63505 versions+4
CVEListV5linksys/re65005 versions+4
CVEListV5linksys/re70005 versions+4

🔴Vulnerability Details

2
GHSA
GHSA-m2h7-w2mc-vj88: A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 12025-08-20
CVEList
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 check_port_conflict stack-based overflow2025-08-20
CVE-2025-9246 (HIGH CVSS 7.4) | A flaw has been found in Linksys RE | cvebase.io