ID

VAR-202512-0426


CVE

CVE-2025-14133


DESCRIPTION

A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this vulnerability is the function AP_get_wireless_clientlist_setClientsName of the file mod_form.so. Performing manipulation of the argument clientsname_0 results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Trust: 1.0

sources: NVD: CVE-2025-14133

AFFECTED PRODUCTS

vendor:linksysmodel:re7000scope:eqversion:1.1.05.003

Trust: 1.0

vendor:linksysmodel:re6300scope:eqversion:1.2.07.001

Trust: 1.0

vendor:linksysmodel:re6350scope:eqversion:1.0.04.001

Trust: 1.0

vendor:linksysmodel:re9000scope:eqversion:1.0.04.002

Trust: 1.0

vendor:linksysmodel:re6250scope:eqversion:1.0.04.001

Trust: 1.0

vendor:linksysmodel:re6500scope:eqversion:1.0.013.001

Trust: 1.0

sources: NVD: CVE-2025-14133

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-14133
value: HIGH

Trust: 1.0

cna@vuldb.com: CVE-2025-14133
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

cna@vuldb.com: CVE-2025-14133
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: NVD: CVE-2025-14133

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-121

Trust: 1.0

sources: NVD: CVE-2025-14133

EXTERNAL IDS

db:VULDBid:334522

Trust: 1.0

db:NVDid:CVE-2025-14133

Trust: 1.0

sources: NVD: CVE-2025-14133

REFERENCES

url:https://www.linksys.com/

Trust: 1.0

url:https://vuldb.com/?id.334522

Trust: 1.0

url:https://github.com/wudipjq/my_vuln/blob/main/linksys2/vuln_62/62.md#poc

Trust: 1.0

url:https://github.com/wudipjq/my_vuln/blob/main/linksys2/vuln_62/62.md

Trust: 1.0

url:https://vuldb.com/?submit.697980

Trust: 1.0

url:https://vuldb.com/?ctiid.334522

Trust: 1.0

sources: NVD: CVE-2025-14133

SOURCES

db:NVDid:CVE-2025-14133

LAST UPDATE DATE

2025-12-19T22:38:36.699000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2025-14133date:2025-12-10T18:00:38.753

SOURCES RELEASE DATE

db:NVDid:CVE-2025-14133date:2025-12-06T11:15:46.530