Home

Description

EN DE

A vulnerability was found in Linksys E1700 1.0.0.4.003. This affects the function QoSSetup of the file /goform/QoSSetup. Performing manipulation of the argument ack_policy results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Eine Schwachstelle wurde in Linksys E1700 1.0.0.4.003 gefunden. Es geht um die Funktion QoSSetup der Datei /goform/QoSSetup. Mittels Manipulieren des Arguments ack_policy mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Die Ausnutzung wurde veröffentlicht und kann verwendet werden.

PUBLISHED Reserved 2025-08-27 | Published 2025-08-27 | Updated 2025-08-27 | Assigner VulDB




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
9.0AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Stack-based Buffer Overflow

Memory Corruption

Product status

1.0.0.4.003
affected

Timeline

2025-08-27:Advisory disclosed
2025-08-27:VulDB entry created
2025-08-27:VulDB entry last update

Credits

Bond_yes (VulDB User) reporter

References

vuldb.com/?id.321544 (VDB-321544 | Linksys E1700 QoSSetup stack-based overflow) vdb-entry technical-description

vuldb.com/?ctiid.321544 (VDB-321544 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.634826 (Submit #634826 | Linksys E1700 E1700(1.0.0.4.003) Stack-based Buffer Overflow) third-party-advisory

github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_60/60.md related

github.com/wudipjq/my_vuln/blob/main/Linksys2/vuln_60/60.md exploit

www.linksys.com/ product

cve.org (CVE-2025-9527)

nvd.nist.gov (CVE-2025-9527)

Download JSON