Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linksys — Vulnerabilities & Security Advisories 93

Browse all 93 CVE security advisories affecting Linksys. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linksys operates primarily as a manufacturer of consumer networking hardware, including wireless routers and mesh systems, facilitating home and small office internet connectivity. Security audits have identified 93 Common Vulnerabilities and Exposures (CVEs) associated with its product line, predominantly stemming from embedded Linux-based firmware. Historically, the most prevalent vulnerability classes involve Remote Code Execution (RCE) and Cross-Site Scripting (XSS), often exploited through unauthenticated access to web management interfaces. Privilege escalation flaws also frequently appear, allowing attackers to gain administrative control over devices. Notable incidents include critical flaws in older WRT series routers that permitted full system compromise without user interaction. These issues largely result from insufficient input validation and hardcoded credentials in legacy firmware versions. While newer models have improved security postures, the historical pattern highlights significant risks in maintaining long-term support for consumer-grade networking equipment with complex embedded software stacks.

CVE IDTitleCVSSSeverityPublished
CVE-2025-9356 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 inboundFilterAdd stack-based overflow — RE6250CWE-121 8.8 High2025-08-22
CVE-2025-9355 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 scheduleAdd stack-based overflow — RE6250CWE-121 8.8 High2025-08-22
CVE-2025-9253 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_doSpecifySiteSurvey stack-based overflow — RE6250CWE-121 8.8 High2025-08-20
CVE-2025-9252 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 DisablePasswordAlertRedirect stack-based overflow — RE6250CWE-121 8.8 High2025-08-20
CVE-2025-9251 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 sta_wps_pin stack-based overflow — RE6250CWE-121 8.8 High2025-08-20
CVE-2025-9250 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setPWDbyBBS stack-based overflow — RE6250CWE-121 8.8 High2025-08-20
CVE-2025-9249 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 DHCPReserveAddGroup stack-based overflow — RE6250CWE-121 8.8 High2025-08-20
CVE-2025-9248 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_pingGatewayByBBS stack-based overflow — RE6250CWE-121 8.8 High2025-08-20
CVE-2025-9247 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setVlan stack-based overflow — RE6250CWE-121 8.8 High2025-08-20
CVE-2025-9246 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 check_port_conflict stack-based overflow — RE6250CWE-121 8.8 High2025-08-20
CVE-2025-9245 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 WPSSTAPINEnr stack-based overflow — RE6250CWE-121 8.8 High2025-08-20
CVE-2025-9244 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 addStaticRoute os command injection — RE6250CWE-78 6.3 Medium2025-08-20
CVE-2025-9146 Linksys E5600 Firmware checkFw.sh verify_gemtek_header risky encryption — E5600CWE-327 6.6 Medium2025-08-19
CVE-2025-8833 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 langSwitchBack stack-based overflow — RE6250CWE-121 8.8 High2025-08-11
CVE-2025-8832 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setDMZ stack-based overflow — RE6250CWE-121 8.8 High2025-08-11
CVE-2025-8831 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 remoteManagement stack-based overflow — RE6250CWE-121 8.8 High2025-08-11
CVE-2025-8830 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setWan sub_3517C os command injection — RE6250CWE-78 6.3 Medium2025-08-11
CVE-2025-8829 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasicAuto um_red os command injection — RE6250CWE-78 6.3 Medium2025-08-11
CVE-2025-8828 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setIpv6 ipv6cmd os command injection — RE6250CWE-78 6.3 Medium2025-08-11
CVE-2025-8827 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasicAuto um_inspect_cross_band os command injection — RE6250CWE-78 6.3 Medium2025-08-11
CVE-2025-8826 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasicAuto um_rp_autochannel stack-based overflow — RE6250CWE-121 8.8 High2025-08-11
CVE-2025-8825 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasicAuto os command injection — RE6250CWE-78 6.3 Medium2025-08-11
CVE-2025-8824 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setRIP stack-based overflow — RE6250CWE-121 8.8 High2025-08-11
CVE-2025-8823 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setDeviceName os command injection — RE6250CWE-78 6.3 Medium2025-08-11
CVE-2025-8822 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setOpMode algDisable stack-based overflow — RE6250CWE-121 8.8 High2025-08-11
CVE-2025-8821 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasic os command injection — RE6250CWE-78 6.3 Medium2025-08-11
CVE-2025-8820 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 wirelessBasic stack-based overflow — RE6250CWE-121 8.8 High2025-08-10
CVE-2025-8819 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setWan stack-based overflow — RE6250CWE-121 8.8 High2025-08-10
CVE-2025-8818 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setLan setDFSSetting os command injection — RE6250CWE-78 6.3 Medium2025-08-10
CVE-2025-8817 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setLan stack-based overflow — RE6250CWE-121 8.8 High2025-08-10

This page lists every published CVE security advisory associated with Linksys. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.