CVE-2025-14136

Dec. 10, 2025, 6 p.m.

7.4
High

Description

A security flaw has been discovered in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function RE2000v2Repeater_get_wired_clientlist_setClientsName of the file mod_form.so. The manipulation of the argument clientsname_0 results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Product(s) Impacted

Vendor Product Versions
Linksys
  • Re6500 Firmware
  • Re6500
  • Re6250 Firmware
  • Re6250
  • Re6300 Firmware
  • Re6300
  • Re6350 Firmware
  • Re6350
  • Re7000 Firmware
  • Re7000
  • Re9000 Firmware
  • Re9000
  • 1.0.013.001
  • -
  • 1.0.04.001
  • -
  • 1.2.07.001
  • -
  • 1.0.04.001
  • -
  • 1.1.05.003
  • -
  • 1.0.04.002
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CWE-787
Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o linksys re6500_firmware 1.0.013.001 / / / / / / /
h linksys re6500 - / / / / / / /
o linksys re6250_firmware 1.0.04.001 / / / / / / /
h linksys re6250 - / / / / / / /
o linksys re6300_firmware 1.2.07.001 / / / / / / /
h linksys re6300 - / / / / / / /
o linksys re6350_firmware 1.0.04.001 / / / / / / /
h linksys re6350 - / / / / / / /
o linksys re7000_firmware 1.1.05.003 / / / / / / /
h linksys re7000 - / / / / / / /
o linksys re9000_firmware 1.0.04.002 / / / / / / /
h linksys re9000 - / / / / / / /

CVSS Score

7.4 / 10

CVSS Data - 4.0

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Attack Requirements: NONE
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope:
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploit Maturity: PROOF_OF_CONCEPT
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    View Vector String

Timeline

Published: Dec. 6, 2025, 1:15 p.m.
Last Modified: Dec. 10, 2025, 6 p.m.

Status : Analyzed

CVE has had analysis completed and all data associations made.

More info

Source

cna@vuldb.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.