VYPR
Unrated severityNVD Advisory· Published Dec 6, 2025· Updated Dec 8, 2025

Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 mod_form.so AP_get_wireless_clientlist_setClientsName stack-based overflow

CVE-2025-14133

Description

A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this vulnerability is the function AP_get_wireless_clientlist_setClientsName of the file mod_form.so. Performing manipulation of the argument clientsname_0 results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

9
  • Linksys/RE6250llm-create
    Range: = 1.0.013.001
  • Linksys/RE6350llm-create
    Range: = 1.0.013.001
  • Linksys/RE6300llm-fuzzy
    Range: = 1.0.013.001
  • Linksys/RE6250v5
    Range: 1.0.013.001
  • Linksys/RE6300v5
    Range: 1.0.013.001
  • Linksys/RE6350v5
    Range: 1.0.013.001
  • Linksys/RE6500v5
    Range: 1.0.013.001
  • Linksys/RE7000v5
    Range: 1.0.013.001
  • Linksys/RE9000v5
    Range: 1.0.013.001

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.