CVE-2025-9362
📋 TL;DR
A stack-based buffer overflow vulnerability in Linksys RE series range extenders allows remote attackers to execute arbitrary code by manipulating URL filter parameters. This affects multiple RE model devices running vulnerable firmware versions. Attackers can exploit this without authentication to potentially take control of affected devices.
💻 Affected Systems
- Linksys RE6250
- Linksys RE6300
- Linksys RE6350
- Linksys RE6500
- Linksys RE7000
- Linksys RE9000
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, persistence, lateral movement to connected networks, and data exfiltration.
Likely Case
Device crash/reboot (denial of service) or limited code execution for reconnaissance and foothold establishment.
If Mitigated
Denial of service only if exploit attempts are blocked by network controls, with no code execution.
🎯 Exploit Status
Exploitation requires crafting specific HTTP requests to manipulate urlFilterRuleName, scheduleUrl, or addURLFilter parameters. No authentication needed. No public exploit code available at time of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: https://www.linksys.com/
Restart Required: No
Instructions:
No official patch available. Vendor was contacted but did not respond. Check Linksys website periodically for firmware updates addressing CVE-2025-9362.
🔧 Temporary Workarounds
Network segmentation and access control
allIsolate Linksys RE devices on separate VLANs and restrict access to management interfaces.
Configure firewall rules to block external access to port 80/443 on RE devices
Implement VLAN segmentation for IoT/wireless extender networks
Disable remote management
allEnsure remote management/administration is disabled on affected devices.
Access web interface > Administration > Remote Management > Disable
Verify only local network access is permitted
🧯 If You Can't Patch
- Replace affected devices with supported models from Linksys or other vendors
- Decommission vulnerable devices if not essential to operations
🔍 How to Verify
Check if Vulnerable:
Access device web interface > Administration > Firmware Upgrade > Check current firmware version matches affected versions.
Check Version:
curl -s http://[device-ip]/goform/getSysInfo | grep firmwareVersion
Verify Fix Applied:
No fix available to verify. Monitor Linksys for firmware updates addressing CVE-2025-9362.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /goform/urlFilterManageRule with unusually long parameters
- Device crash/reboot logs following web interface access attempts
Network Indicators:
- HTTP traffic to RE device management interface with buffer overflow patterns in POST data
- Unusual outbound connections from RE devices post-exploitation
SIEM Query:
source="linksys-re-*" AND url="/goform/urlFilterManageRule" AND (param="urlFilterRuleName" OR param="scheduleUrl" OR param="addURLFilter") AND length(param_value) > 100