CVE-2025-22916
Published: 16 January 2025
Summary
CVE-2025-22916 is a critical-severity Classic Buffer Overflow (CWE-120) vulnerability in Edimax Re11S Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and patching of the stack overflow flaw in RE11S v1.11 formPPPoESetup function.
Mandates validation of the pppUserName parameter to block excessive input causing the stack-based buffer overflow.
Implements memory safeguards like stack canaries and non-executable stacks to mitigate exploitation of the buffer overflow vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack-based buffer overflow in formPPPoESetup (web form for PPPoE) allows unauthenticated remote RCE via crafted pppUserName parameter, directly enabling T1190 for initial access to public-facing application.
NVD Description
RE11S v1.11 was discovered to contain a stack overflow via the pppUserName parameter in the formPPPoESetup function.
Deeper analysisAI
CVE-2025-22916 is a stack-based buffer overflow vulnerability (CWE-120) affecting RE11S version 1.11. The flaw occurs in the formPPPoESetup function when processing the pppUserName parameter, allowing excessive data to overflow the stack. This critical issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating severe potential impact from remote exploitation.
An unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By sending a specially crafted request targeting the pppUserName parameter, the attacker can trigger the stack overflow, potentially leading to arbitrary code execution, denial of service, or full compromise of the affected device, with high impacts on confidentiality, integrity, and availability.
References include the vendor site at http://re11s.com and https://www.edimax.com/edimax/global/, along with a GitHub proof-of-concept at https://github.com/xyqer1/RE11S_1.11-formPPPoESetup-StackOverflow. No specific mitigation or patch details are detailed in the available information.
Details
- CWE(s)