CVE-2025-14134

Dec. 10, 2025, 6 p.m.

7.4
High

Description

A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RE2000v2Repeater_get_wireless_clientlist_setClientsName of the file mod_form.so. Executing manipulation of the argument clientsname_0 can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Product(s) Impacted

Vendor Product Versions
Linksys
  • Re6500 Firmware
  • Re6500
  • Re6250 Firmware
  • Re6250
  • Re6300 Firmware
  • Re6300
  • Re6350 Firmware
  • Re6350
  • Re7000 Firmware
  • Re7000
  • Re9000 Firmware
  • Re9000
  • 1.0.013.001
  • -
  • 1.0.04.001
  • -
  • 1.2.07.001
  • -
  • 1.0.04.001
  • -
  • 1.1.05.003
  • -
  • 1.0.04.002
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o linksys re6500_firmware 1.0.013.001 / / / / / / /
h linksys re6500 - / / / / / / /
o linksys re6250_firmware 1.0.04.001 / / / / / / /
h linksys re6250 - / / / / / / /
o linksys re6300_firmware 1.2.07.001 / / / / / / /
h linksys re6300 - / / / / / / /
o linksys re6350_firmware 1.0.04.001 / / / / / / /
h linksys re6350 - / / / / / / /
o linksys re7000_firmware 1.1.05.003 / / / / / / /
h linksys re7000 - / / / / / / /
o linksys re9000_firmware 1.0.04.002 / / / / / / /
h linksys re9000 - / / / / / / /

CVSS Score

7.4 / 10

CVSS Data - 4.0

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Attack Requirements: NONE
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope:
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploit Maturity: PROOF_OF_CONCEPT
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    View Vector String

Timeline

Published: Dec. 6, 2025, 11:15 a.m.
Last Modified: Dec. 10, 2025, 6 p.m.

Status : Analyzed

CVE has had analysis completed and all data associations made.

More info

Source

cna@vuldb.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.