ID

VAR-202512-0088


CVE

CVE-2025-14134


DESCRIPTION

A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RE2000v2Repeater_get_wireless_clientlist_setClientsName of the file mod_form.so. Executing manipulation of the argument clientsname_0 can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Trust: 1.0

sources: NVD: CVE-2025-14134

AFFECTED PRODUCTS

vendor:linksysmodel:re7000scope:eqversion:1.1.05.003

Trust: 1.0

vendor:linksysmodel:re6300scope:eqversion:1.2.07.001

Trust: 1.0

vendor:linksysmodel:re6350scope:eqversion:1.0.04.001

Trust: 1.0

vendor:linksysmodel:re9000scope:eqversion:1.0.04.002

Trust: 1.0

vendor:linksysmodel:re6250scope:eqversion:1.0.04.001

Trust: 1.0

vendor:linksysmodel:re6500scope:eqversion:1.0.013.001

Trust: 1.0

sources: NVD: CVE-2025-14134

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-14134
value: HIGH

Trust: 1.0

cna@vuldb.com: CVE-2025-14134
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

cna@vuldb.com: CVE-2025-14134
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: NVD: CVE-2025-14134

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-121

Trust: 1.0

sources: NVD: CVE-2025-14134

EXTERNAL IDS

db:VULDBid:334523

Trust: 1.0

db:NVDid:CVE-2025-14134

Trust: 1.0

sources: NVD: CVE-2025-14134

REFERENCES

url:https://www.linksys.com/

Trust: 1.0

url:https://vuldb.com/?id.334523

Trust: 1.0

url:https://vuldb.com/?submit.697981

Trust: 1.0

url:https://github.com/wudipjq/my_vuln/blob/main/linksys2/vuln_63/63.md

Trust: 1.0

url:https://github.com/wudipjq/my_vuln/blob/main/linksys2/vuln_63/63.md#poc

Trust: 1.0

url:https://vuldb.com/?ctiid.334523

Trust: 1.0

sources: NVD: CVE-2025-14134

SOURCES

db:NVDid:CVE-2025-14134

LAST UPDATE DATE

2025-12-19T22:41:07.942000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2025-14134date:2025-12-10T18:00:27.810

SOURCES RELEASE DATE

db:NVDid:CVE-2025-14134date:2025-12-06T11:15:48.437