Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

RE6250 — Vulnerabilities & Security Advisories 43

All 43 CVE vulnerabilities found in RE6250, with AI-generated Chinese analysis, references, and POCs.

Vendor: Linksys

CVE IDTitleCVSSSeverityPublished
CVE-2025-8828 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setIpv6 ipv6cmd os command injection CWE-78 6.3 Medium2025-08-11
CVE-2025-8827 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasicAuto um_inspect_cross_band os command injection CWE-78 6.3 Medium2025-08-11
CVE-2025-8826 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasicAuto um_rp_autochannel stack-based overflow CWE-121 8.8 High2025-08-11
CVE-2025-8825 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasicAuto os command injection CWE-78 6.3 Medium2025-08-11
CVE-2025-8824 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setRIP stack-based overflow CWE-121 8.8 High2025-08-11
CVE-2025-8823 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setDeviceName os command injection CWE-78 6.3 Medium2025-08-11
CVE-2025-8822 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setOpMode algDisable stack-based overflow CWE-121 8.8 High2025-08-11
CVE-2025-8821 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasic os command injection CWE-78 6.3 Medium2025-08-11
CVE-2025-8820 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 wirelessBasic stack-based overflow CWE-121 8.8 High2025-08-10
CVE-2025-8819 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setWan stack-based overflow CWE-121 8.8 High2025-08-10
CVE-2025-8818 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setLan setDFSSetting os command injection CWE-78 6.3 Medium2025-08-10
CVE-2025-8817 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setLan stack-based overflow CWE-121 8.8 High2025-08-10
CVE-2025-8816 Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setOpMode stack-based overflow CWE-121 8.8 High2025-08-10

All 43 known CVE vulnerabilities affecting RE6250 with full Chinese analysis, references, and POCs where available.