CVE-2025-9355Improper Restriction of Operations within the Bounds of a Memory Buffer in Linksys Re6250

Severity
7.4HIGHNVD
EPSS
0.4%
top 42.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 22

Description

A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this vulnerability is the function scheduleAdd of the file /goform/scheduleAdd. Performing manipulation of the argument ruleName results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages12 packages

CVEListV5linksys/re62505 versions+4
CVEListV5linksys/re63005 versions+4
CVEListV5linksys/re63505 versions+4
CVEListV5linksys/re65005 versions+4
CVEListV5linksys/re70005 versions+4

🔴Vulnerability Details

2
CVEList
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 scheduleAdd stack-based overflow2025-08-22
GHSA
GHSA-j35x-v893-qc3w: A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 12025-08-22

📋Vendor Advisories

1
Microsoft
Golang-fips: golang fips zeroed buffer2024-10-08
CVE-2025-9355 — Linksys Re6250 vulnerability | cvebase