Introduction
Remote attackers can gain code execution on widely deployed Linksys RE series range extenders due to a stack-based buffer overflow in the setIpv6 function. This vulnerability affects millions of consumer and small business networks, with public exploit code already available and no vendor patch or advisory at the time of writing.
Linksys is a major networking hardware vendor with a global footprint in consumer and SMB markets. Their RE series range extenders are commonly used to expand WiFi coverage in homes and offices. The company has a history of similar vulnerabilities in this product line, and public sources indicate a pattern of slow or absent response to coordinated security disclosures.
Technical Information
CVE-2025-9481 is a stack-based buffer overflow in the setIpv6 function, accessible via the /goform/setIpv6
HTTP endpoint on affected Linksys RE series devices. The vulnerability arises from improper handling of the tunrd_Prefix
parameter in HTTP POST requests. Specifically, the function copies user-supplied data from this parameter into a fixed-size stack buffer without validating its length. This allows an attacker to overwrite adjacent stack memory, including the return address, leading to arbitrary code execution.
Key technical points:
- The vulnerable code path is triggered by an HTTP POST to
/goform/setIpv6
with an oversizedtunrd_Prefix
value. - No authentication is required to exploit the vulnerability.
- The flaw is present in multiple firmware versions, indicating a systemic input validation issue.
- Public exploit code exists, lowering the barrier for exploitation.
No official code snippet has been published by the vendor or in advisories. For further technical details and exploit references, see the linked external research.
Affected Systems and Versions
The following Linksys RE series models and firmware versions are affected:
- RE6250: 1.0.013.001
- RE6300: 1.0.04.001
- RE6350: 1.0.04.002
- RE6500: 1.1.05.003
- RE7000: 1.2.07.001
- RE9000: 1.2.07.001
All configurations exposing the /goform/setIpv6
endpoint are vulnerable.
Vendor Security History
Linksys has experienced multiple critical buffer overflow vulnerabilities in the same RE series product line, including:
- CVE-2025-9355 (scheduleAdd endpoint)
- CVE-2025-8826 (various endpoints)
- CVE-2025-9357 (other /goform/ endpoints)
- CVE-2025-8831 (remoteManagement endpoint)
Public sources report a pattern of slow or absent vendor response to coordinated disclosure, with no patches or advisories released for these issues as of the publication date.