Severity
7.4HIGH
EPSS
0.4%
top 42.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 23

Description

A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. This manipulation of the argument ssidhex/pwd causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure b

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages12 packages

CVEListV5linksys/re62505 versions+4
CVEListV5linksys/re63005 versions+4
CVEListV5linksys/re63505 versions+4
CVEListV5linksys/re65005 versions+4
CVEListV5linksys/re70005 versions+4

🔴Vulnerability Details

2
CVEList
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_checkCredentialsByBBS stack-based overflow2025-08-23
GHSA
GHSA-fr2h-4jw6-q763: A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 12025-08-23

📋Vendor Advisories

1
Microsoft
ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses2024-05-14
CVE-2025-9359 (HIGH CVSS 7.4) | A weakness has been identified in L | cvebase.io