Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 /goform/inboundFilterAdd ruleName Pufferüberlauf

Hakika vulnerability da aka rarraba a matsayin kura an gano a Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Tabbas, aikin inboundFilterAdd ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil /goform/inboundFilterAdd, a cikin sashi $software_component. Wuro manipulation of the argument ruleName ga Pufferüberlauf. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-121. Lalle, rauni an sanar da shi 08/22/2025. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2025-9356. Ngam yiɗi ka a tuma ndiyam ka nder waya. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a github.com. 0-day ga, an ndiyam a wuro be $0-$5k. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

2 Goyarwa · 89 Datenpunkte

FurɗeSúgá
08/22/2025 17:45
Gargadi 1/1
09/03/2025 03:21
software_vendorLinksysLinksys
software_nameRE6250/RE6300/RE6350/RE6500/RE7000/RE9000RE6250/RE6300/RE6350/RE6500/RE7000/RE9000
software_version1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.0011.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001
software_file/goform/inboundFilterAdd/goform/inboundFilterAdd
software_functioninboundFilterAddinboundFilterAdd
software_argumentruleNameruleName
vulnerability_cweCWE-121 (Pufferüberlauf)CWE-121 (Pufferüberlauf)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cHH
cvss3_vuldb_iHH
cvss3_vuldb_aHH
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_24/24.mdhttps://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_24/24.md
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_24/24.md#pochttps://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_24/24.md#poc
source_cveCVE-2025-9356CVE-2025-9356
cna_responsibleVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciCC
cvss2_vuldb_iiCC
cvss2_vuldb_aiCC
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcHH
cvss4_vuldb_viHH
cvss4_vuldb_vaHH
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore9.09.0
cvss2_vuldb_tempscore7.77.7
cvss3_vuldb_basescore8.88.8
cvss3_vuldb_tempscore8.08.0
cvss3_meta_basescore8.88.8
cvss3_meta_tempscore8.08.4
cvss4_vuldb_bscore8.78.7
cvss4_vuldb_btscore7.47.4
advisory_date1755813600 (08/22/2025)1755813600 (08/22/2025)
price_0day$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function inboundFilterAdd of the file /goform/inboundFilterAdd. Executing manipulation of the argument ruleName can lead to stack-based buffer overflow. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
cve_nvd_summaryesSe detectó una vulnerabilidad en Linksys RE6250, RE6300, RE6350, RE6500, RE7000 y RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. La función inboundFilterAdd del archivo /goform/inboundFilterAdd se ve afectada. La manipulación del argumento ruleName puede provocar un desbordamiento del búfer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación para informarle sobre esta divulgación, pero no respondió.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcH
cvss4_cna_viH
cvss4_cna_vaH
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore8.7
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cH
cvss3_cna_iH
cvss3_cna_aH
cvss3_cna_basescore8.8
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciC
cvss2_cna_iiC
cvss2_cna_aiC
cvss2_cna_basescore9

Do you want to use VulDB in your project?

Use the official API to access entries easily!