Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-9393

Опубликовано: 24 авг. 2025
Источник: nvd
CVSS3: 8.8
CVSS2: 9
EPSS Низкий

Описание

A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function addStaProfile of the file /goform/addStaProfile. Performing manipulation of the argument profile_name/Ssid/wep_key_1/wep_key_2/wep_key_3/wep_key_4/wep_key_length/wep_default_key/cipher/passphrase results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:linksys:re6250_firmware:1.0.04.001:*:*:*:*:*:*:*
cpe:2.3:h:linksys:re6250:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:linksys:re6300_firmware:1.2.07.001:*:*:*:*:*:*:*
cpe:2.3:h:linksys:re6300:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:linksys:re6350_firmware:1.0.04.001:*:*:*:*:*:*:*
cpe:2.3:h:linksys:re6350:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:linksys:re7000_firmware:1.1.05.003:*:*:*:*:*:*:*
cpe:2.3:h:linksys:re7000:-:*:*:*:*:*:*:*
Конфигурация 5

Одновременно

cpe:2.3:o:linksys:re9000_firmware:1.0.04.002:*:*:*:*:*:*:*
cpe:2.3:h:linksys:re9000:-:*:*:*:*:*:*:*

EPSS

Процентиль: 43%
0.00208
Низкий

8.8 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 8.8
github
6 месяцев назад

A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function addStaProfile of the file /goform/addStaProfile. Performing manipulation of the argument profile_name/Ssid/wep_key_1/wep_key_2/wep_key_3/wep_key_4/wep_key_length/wep_default_key/cipher/passphrase results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 43%
0.00208
Низкий

8.8 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-119