CVE-2025-14136
Published: 06 December 2025
Description
A security flaw has been discovered in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function RE2000v2Repeater_get_wired_clientlist_setClientsName of the file mod_form.so. The manipulation of the argument clientsname_0 results in stack-based buffer overflow. The attack may…
more
be launched remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the stack buffer overflow by requiring identification, reporting, and correction of the flaw in affected Linksys firmware versions through timely patching.
Prevents exploitation by enforcing input validation mechanisms on the clientsname_0 argument at the mod_form.so entry point to block buffer overflow attempts.
Mitigates successful buffer overflow exploitation via memory protections like non-executable stack and address randomization, limiting arbitrary code execution on the device.
Security SummaryAI
CVE-2025-14136 is a stack-based buffer overflow vulnerability in the RE2000v2Repeater_get_wired_clientlist_setClientsName function of the mod_form.so file. It affects Linksys Wi-Fi range extender models RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000 running firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, or 1.2.07.001. The issue stems from manipulation of the clientsname_0 argument and is associated with CWEs-119, CWE-121, and CWE-787.
An attacker with low privileges can exploit this vulnerability remotely without user interaction, as indicated by the CVSS 3.1 score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Exploitation enables high-impact compromise of confidentiality, integrity, and availability, potentially allowing arbitrary code execution on the affected device.
VulDB advisories detail the vulnerability, and a proof-of-concept exploit is publicly available on GitHub. The vendor was contacted early regarding disclosure but provided no response, and no patches or official mitigations have been issued.
A public exploit has been released, increasing the risk of active exploitation.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote stack-based buffer overflow in mod_form.so web handler (clientsname_0 parameter) enables exploitation of public-facing application for initial access (T1190) and application exploitation leading to endpoint denial of service (T1499.004).