CVE-2025-9358
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-23

Last updated on: 2025-09-02

Assigner: VulDB

Description
A security flaw has been discovered in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function setSysAdm of the file /goform/setSysAdm. The manipulation of the argument admpasshint results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-23
Last Modified
2025-09-02
Generated
2026-05-06
AI Q&A
2025-08-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 12 associated CPEs
Vendor Product Version / Range
linksys re6250_firmware 1.0.04.001
linksys re6250 *
linksys re6300_firmware 1.2.07.001
linksys re6300 *
linksys re6350_firmware 1.0.04.001
linksys re6350 *
linksys re7000_firmware 1.1.05.003
linksys re7000 *
linksys re9000_firmware 1.0.04.002
linksys re9000 *
linksys re6500_firmware 1.0.013.001
linksys re6500 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CWE-119 The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-9358 is a stack-based buffer overflow vulnerability in multiple Linksys range extender models. It occurs in the setSysAdm function of the /goform/setSysAdm file, where the argument "admpasshint" is not properly validated for length. An attacker can remotely supply an excessively long "admpasshint" value, causing a stack overflow that can crash the device or potentially allow execution of arbitrary code. [1, 2]


How can this vulnerability impact me? :

This vulnerability can be exploited remotely without authentication, impacting the confidentiality, integrity, and availability of the affected Linksys devices. An attacker could crash the device or execute arbitrary code, potentially taking control of the device or disrupting its operation. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring network traffic for attempts to access the /goform/setSysAdm endpoint with unusually long or malformed 'admpasshint' parameters, which indicate exploitation attempts. Since the exploit is publicly available and targets the 'admpasshint' argument causing a stack overflow, inspecting HTTP requests to the affected routers for this parameter is key. Specific commands would depend on your network monitoring tools, but using tools like tcpdump or Wireshark to filter HTTP POST requests to /goform/setSysAdm and checking for long 'admpasshint' values can help detect exploitation attempts. For example, using tcpdump: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' and then filtering for /goform/setSysAdm in the payload. Alternatively, using web server or router logs to identify suspicious requests to /goform/setSysAdm with large 'admpasshint' parameters can also help. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include replacing affected Linksys devices (RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 with specified firmware versions) with alternative products, as no patches or vendor mitigations are currently available. Additionally, restricting remote access to the affected devices, disabling remote management if possible, and monitoring for exploitation attempts can reduce risk. Since the vendor has not responded or provided fixes, network segmentation and firewall rules blocking access to the vulnerable endpoint /goform/setSysAdm from untrusted networks are recommended. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart