Home

Description

EN DE

A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function qosClassifier of the file /goform/qosClassifier. Such manipulation of the argument dir/sFromPort/sToPort/dFromPort/dToPort/protocol/layer7/dscp/remark_dscp leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Es wurde eine Schwachstelle in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 entdeckt. Betroffen ist die Funktion qosClassifier der Datei /goform/qosClassifier. Durch das Beeinflussen des Arguments dir/sFromPort/sToPort/dFromPort/dToPort/protocol/layer7/dscp/remark_dscp mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Ein Angriff ist aus der Distanz möglich. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-08-23 | Published 2025-08-24 | Updated 2025-08-25 | Assigner VulDB




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
9.0AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Stack-based Buffer Overflow

Memory Corruption

Product status

1.0.013.001
affected

1.0.04.001
affected

1.0.04.002
affected

1.1.05.003
affected

1.2.07.001
affected

1.0.013.001
affected

1.0.04.001
affected

1.0.04.002
affected

1.1.05.003
affected

1.2.07.001
affected

1.0.013.001
affected

1.0.04.001
affected

1.0.04.002
affected

1.1.05.003
affected

1.2.07.001
affected

1.0.013.001
affected

1.0.04.001
affected

1.0.04.002
affected

1.1.05.003
affected

1.2.07.001
affected

1.0.013.001
affected

1.0.04.001
affected

1.0.04.002
affected

1.1.05.003
affected

1.2.07.001
affected

1.0.013.001
affected

1.0.04.001
affected

1.0.04.002
affected

1.1.05.003
affected

1.2.07.001
affected

Timeline

2025-08-23:Advisory disclosed
2025-08-23:VulDB entry created
2025-08-23:VulDB entry last update

Credits

pjq123 (VulDB User) reporter

References

vuldb.com/?id.321225 (VDB-321225 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 qosClassifier stack-based overflow) vdb-entry technical-description

vuldb.com/?ctiid.321225 (VDB-321225 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.631537 (Submit #631537 | Linksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow) third-party-advisory

github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_32/32.md related

github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_32/32.md exploit

www.linksys.com/ product

cve.org (CVE-2025-9392)

nvd.nist.gov (CVE-2025-9392)

Download JSON