Introduction
Remote attackers can take over Linksys RE series range extenders by exploiting a stack-based buffer overflow in the device's web interface. CVE-2025-8822 affects a wide range of popular consumer and SMB WiFi extenders, exposing networks to code execution risks with no authentication required.
Linksys is a major brand in the global consumer and SMB networking market, with millions of deployed devices. The RE series range extenders are widely used to expand wireless coverage in homes and offices, often running for years without updates or active management.
Technical Information
CVE-2025-8822 is a stack-based buffer overflow in the algDisable function of the /goform/setOpMode
endpoint on Linksys RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 devices with firmware up to 20250801.
The vulnerability is triggered when a remote attacker sends an HTTP POST request to /goform/setOpMode
with an opMode
parameter whose value exceeds the size of the stack buffer allocated in the algDisable function. The function copies the opMode value into a fixed-size stack buffer without proper bounds checking. This allows the attacker to overwrite adjacent stack memory, including the saved return address, and potentially redirect execution to attacker-controlled code.
The endpoint is accessible without authentication, so any device reachable on the network (or internet, if exposed) is vulnerable. The vulnerability is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow).
Public exploit code is available, which increases the risk of automated exploitation and inclusion in botnets or malware campaigns.
Affected Systems and Versions
- Linksys RE6250, RE6300, RE6350, RE6500, RE7000, RE9000
- All firmware versions up to and including 20250801
- Devices with the web management interface accessible from untrusted networks are at highest risk
Vendor Security History
Linksys has a history of critical vulnerabilities in its networking products, especially in the RE series. Recent CVEs include:
- CVE-2025-8816 and CVE-2025-8817: Stack-based buffer overflows in similar endpoints
- CVE-2025-5438, CVE-2025-5441, CVE-2025-5442, CVE-2025-5443, CVE-2025-5445, CVE-2025-5446, CVE-2025-5447: Command injection vulnerabilities in the same device family
- CVE-2025-34037: OS command injection in E-Series routers, exploited by TheMoon botnet
The vendor has not responded to disclosure attempts for CVE-2025-8822, and no patch is available as of publication.