CVE-2025-9250

8.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Linksys RE series range extenders allows remote attackers to execute arbitrary code by manipulating the 'hint' parameter in the setPWDbyBBS function. This affects multiple RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 models running vulnerable firmware versions. Attackers can exploit this remotely without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • Linksys RE6250
  • Linksys RE6300
  • Linksys RE6350
  • Linksys RE6500
  • Linksys RE7000
  • Linksys RE9000
Versions: 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, 1.2.07.001
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable by default. The web management interface is typically enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, creation of persistent backdoors, lateral movement to other network devices, and data exfiltration.

🟠

Likely Case

Device takeover enabling network reconnaissance, credential harvesting, and use as pivot point for further attacks.

🟢

If Mitigated

Limited impact if devices are isolated in separate VLANs with strict network segmentation and egress filtering.

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication, public exploit available.
🏢 Internal Only: HIGH - Even internally, devices are vulnerable to network-based attacks from compromised hosts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on GitHub. Attack requires network access to device management interface (typically port 80/443).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.linksys.com/

Restart Required: Yes

Instructions:

1. Check Linksys website for firmware updates. 2. If update available, download and install via web interface. 3. Reboot device after update. 4. Verify firmware version is no longer vulnerable.

🔧 Temporary Workarounds

Disable remote management

all

Disable web management interface or restrict access to trusted IPs only

Network segmentation

all

Place range extenders in isolated VLAN separate from critical assets

🧯 If You Can't Patch

  • Immediately disconnect vulnerable devices from network
  • Replace with different models or brands that are not affected

🔍 How to Verify

Check if Vulnerable:

Access device web interface, navigate to Administration > Firmware Upgrade, check current firmware version against vulnerable list.

Check Version:

curl -s http://[device-ip]/goform/getSysInfo | grep firmware

Verify Fix Applied:

After firmware update, verify version is different from vulnerable versions listed.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /goform/setPWDbyBBS with long hint parameters
  • Unusual process execution or system reboots

Network Indicators:

  • HTTP POST requests to /goform/setPWDbyBBS with unusually long parameters
  • Outbound connections from range extenders to unknown IPs

SIEM Query:

source="firewall" AND (url="/goform/setPWDbyBBS" AND content_length>1000)

🔗 References

📤 Share & Export