CVE-2025-14134
Published: 06 December 2025
Description
A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RE2000v2Repeater_get_wireless_clientlist_setClientsName of the file mod_form.so. Executing manipulation of the argument clientsname_0 can lead to stack-based buffer overflow. The attack…
more
can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Mitigating Controls (NIST 800-53 r5)AI
Validates the clientsname_0 argument to prevent stack-based buffer overflows from malformed or oversized inputs in the mod_form.so function.
Implements memory safeguards like stack canaries, ASLR, and non-executable memory to block exploitation of the stack-based buffer overflow.
Requires timely identification, reporting, and correction of the buffer overflow flaw in affected Linksys firmware versions.
Security SummaryAI
CVE-2025-14134 is a stack-based buffer overflow vulnerability in the RE2000v2Repeater_get_wireless_clientlist_setClientsName function of the mod_form.so file. It affects Linksys Wi-Fi range extenders, specifically models RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000 running firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001.
The vulnerability is exploitable remotely over the network by an attacker with low privileges, requiring low attack complexity and no user interaction. Manipulation of the clientsname_0 argument triggers the buffer overflow, enabling high-impact consequences including unauthorized access to confidential data, modification of system integrity, and denial of service, as scored at CVSS 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Advisories from VulDB and referenced GitHub repositories disclose a publicly available proof-of-concept exploit but note no response from the vendor despite early notification, with no patches or mitigations provided. Security practitioners should isolate affected devices and monitor for exploitation attempts detailed in the references.
The exploit has been publicly disclosed and may be utilized, with root causes tied to CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow).
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack-based buffer overflow in the remote web interface function RE2000v2Repeater_get_wireless_clientlist_setClientsName (mod_form.so) enables remote code execution via exploitation of a public-facing application.