Introduction
Remote attackers can take control of Linksys RE series range extenders by exploiting a stack-based buffer overflow in their web management interface. This flaw impacts a wide range of consumer and small business deployments, with no vendor patch or official remediation available as of this writing.
Linksys is a globally recognized networking hardware vendor, with millions of devices deployed in homes and offices. The RE series range extenders are among their most popular products, designed to extend wireless coverage in residential and small business environments. The company's firmware has faced repeated scrutiny for memory corruption and command injection vulnerabilities, particularly in recent years.
Technical Information
CVE-2025-8826 is a stack-based buffer overflow in the um_rp_autochannel
function, exposed via the /goform/RP_setBasicAuto
endpoint on Linksys RE6250, RE6300, RE6350, RE6500, RE7000, and RE9000 range extenders running firmware up to 20250801.
The vulnerability is triggered when an attacker submits an HTTP POST request with an overly long value for either the apcli_AuthMode_2G
or apcli_AuthMode_5G
parameter. The function copies these parameters into a fixed-size stack buffer without proper bounds checking. If the supplied value exceeds the buffer size, adjacent stack memory is overwritten, potentially including the function's return address. This can enable remote code execution if the attacker crafts the payload correctly.
The endpoint is accessible via the device's web management interface, and exploitation does not require authentication. The vulnerability falls under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow).
No patch or official workaround is available. The vendor has not responded to disclosure attempts.
Affected Systems and Versions
- Linksys RE6250 (firmware up to 20250801)
- Linksys RE6300 (firmware up to 20250801)
- Linksys RE6350 (firmware up to 20250801)
- Linksys RE6500 (firmware up to 20250801)
- Linksys RE7000 (firmware up to 20250801)
- Linksys RE9000 (firmware up to 20250801)
All configurations with the vulnerable firmware are affected. The vulnerability is present in the default configuration and does not require any special setup.
Vendor Security History
Linksys has a documented history of memory corruption and command injection vulnerabilities in its firmware, especially in the RE series. Recent disclosures include:
- CVE-2025-8816: Stack-based buffer overflow in setOpMode
- CVE-2025-8817: Stack-based buffer overflow in setLan
- CVE-2025-5442: OS command injection in RP_pingGatewayByBBS
- CVE-2025-5445: OS command injection in RP_checkFWByBBS
- CVE-2025-5446: OS command injection in RP_checkCredentialsByBBS
Multiple advisories note that Linksys has not responded to coordinated disclosure attempts for these issues, and patches are often delayed or unavailable.