CVE-2025-9483

8.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Linksys RE series range extenders allows remote attackers to execute arbitrary code by manipulating parameters in the singlePortForwardAdd function. This affects multiple RE model devices running vulnerable firmware versions. Successful exploitation could lead to complete device compromise.

💻 Affected Systems

Products:
  • Linksys RE6250
  • Linksys RE6300
  • Linksys RE6350
  • Linksys RE6500
  • Linksys RE7000
  • Linksys RE9000
Versions: 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, 1.2.07.001
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with web management interface enabled are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full device takeover, persistence installation, and lateral movement to connected networks.

🟠

Likely Case

Device compromise allowing attacker to modify configurations, intercept traffic, or use device as pivot point for further attacks.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access and proper network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exploit code is publicly available on GitHub, making exploitation trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

No official patch available. Check Linksys support website periodically for firmware updates.

🔧 Temporary Workarounds

Disable Remote Management

all

Disable web management interface from WAN/Internet access

Access router admin interface > Administration > Remote Management > Disable

Network Segmentation

all

Place range extenders on isolated VLAN separate from critical infrastructure

🧯 If You Can't Patch

  • Replace affected devices with supported models from different vendors
  • Implement strict firewall rules blocking all inbound traffic to range extender management interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device web interface: Login > Administration > Firmware Upgrade

Check Version:

curl -s http://[device-ip]/goform/getSysInfo | grep firmware

Verify Fix Applied:

Verify firmware version is no longer in affected version list

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /goform/singlePortForwardAdd with long parameter values
  • Unusual outbound connections from range extender

Network Indicators:

  • HTTP requests with abnormally long ruleName/schedule/inboundFilter parameters
  • Traffic spikes from range extender to unknown external IPs

SIEM Query:

source="range-extender-logs" AND url="/goform/singlePortForwardAdd" AND (param_length>100 OR status_code=500)

🔗 References

📤 Share & Export