根据截图内容,以下是关于漏洞的关键信息: Vendor: Linksys Affected Products: RE6500, RE6250, RE6300, RE6350, RE7000, RE9000 Versions Affected: - RE6500 (1.0.013.001) - RE6250 (1.0.04.001) - RE6300 (1.2.07.001) - RE6350 (1.0.04.001) - RE7000 (1.1.05.003) - RE9000 (1.0.04.002) Vulnerability Type: Stack Overflow Vulnerability Description Vulnerable Code: The parameter in the function is directly passed by the attacker, leading to a stack overflow if the data is too long. Impact: Allows remote attackers to crash the server and potentially execute arbitrary code due to lack of input validation. PoC Result: The target router crashes and cannot provide services correctly and persistently. Supplement Recommendation: String content should be checked in the input extraction part to avoid buffer overflow.