Key Information Vulnerability Overview Vendor: Linksys Affected Products: RE6500, RE6250, RE6300, RE6350, RE7000, RE9000 Versions: - RE6500(1.0.013.001) - RE6250(1.0.04.001) - RE6300(1.2.07.001) - RE6350(1.0.04.001) - RE7000(1.1.05.003) - RE9000(1.0.04.002) Vulnerability Type: Stack Overflow Vulnerability Description Location Found: In the function of Linksys routers, the parameter is directly passed to the attacker. Issue: If the input data is excessively long, it causes a stack overflow, allowing the attacker to control and execute arbitrary code. Root Cause: The input is not validated and is directly copied into a local variable on the stack, overwriting the function's return address, leading to a buffer overflow. Additional Notes To prevent such issues, it is recommended to validate string content during the input extraction phase. PoC (Proof of Concept) Request Example: Result: The target router crashes and becomes unavailable for normal service.