Cyber Posture

CVE-2025-14134

HighPublic PoC

Published: 06 December 2025

Published
06 December 2025
Modified
10 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0026 49.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RE2000v2Repeater_get_wireless_clientlist_setClientsName of the file mod_form.so. Executing manipulation of the argument clientsname_0 can lead to stack-based buffer overflow. The attack…

more

can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates the clientsname_0 argument to prevent stack-based buffer overflows from malformed or oversized inputs in the mod_form.so function.

prevent

Implements memory safeguards like stack canaries, ASLR, and non-executable memory to block exploitation of the stack-based buffer overflow.

preventrecover

Requires timely identification, reporting, and correction of the buffer overflow flaw in affected Linksys firmware versions.

Security SummaryAI

CVE-2025-14134 is a stack-based buffer overflow vulnerability in the RE2000v2Repeater_get_wireless_clientlist_setClientsName function of the mod_form.so file. It affects Linksys Wi-Fi range extenders, specifically models RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000 running firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001.

The vulnerability is exploitable remotely over the network by an attacker with low privileges, requiring low attack complexity and no user interaction. Manipulation of the clientsname_0 argument triggers the buffer overflow, enabling high-impact consequences including unauthorized access to confidential data, modification of system integrity, and denial of service, as scored at CVSS 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Advisories from VulDB and referenced GitHub repositories disclose a publicly available proof-of-concept exploit but note no response from the vendor despite early notification, with no patches or mitigations provided. Security practitioners should isolate affected devices and monitor for exploitation attempts detailed in the references.

The exploit has been publicly disclosed and may be utilized, with root causes tied to CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow).

Details

CWE(s)

Affected Products

linksys
re6500 firmware
1.0.013.001
linksys
re6250 firmware
1.0.04.001
linksys
re6300 firmware
1.2.07.001
linksys
re6350 firmware
1.0.04.001
linksys
re7000 firmware
1.1.05.003
linksys
re9000 firmware
1.0.04.002

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Stack-based buffer overflow in the remote web interface function RE2000v2Repeater_get_wireless_clientlist_setClientsName (mod_form.so) enables remote code execution via exploitation of a public-facing application.

References