A vulnerability, which was classified as critical, was found in Netgear EX6200 1.0.3.94. This affects the function sub_3C03C. The manipulation of the argument host leads to buffer overflow. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.
History

Mon, 12 May 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Netgear
Netgear ex6200
Netgear ex6200 Firmware
CPEs cpe:2.3:h:netgear:ex6200:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ex6200_firmware:1.0.3.94:*:*:*:*:*:*:*
Vendors & Products Netgear
Netgear ex6200
Netgear ex6200 Firmware

Thu, 01 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 01 May 2025 15:45:00 +0000

Type Values Removed Values Added
Title Netgear EX6200 sub_3C03C buffer overflow
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Wed, 30 Apr 2025 22:45:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, was found in Netgear EX6200 1.0.3.94. This affects the function sub_3C03C. The manipulation of the argument host leads to buffer overflow. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9.0, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-05-01T15:33:55.055Z

Reserved: 2025-04-30T14:07:39.602Z

Link: CVE-2025-4141

cve-icon Vulnrichment

Updated: 2025-05-01T14:51:40.573Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-30T22:15:17.287

Modified: 2025-05-12T19:40:05.830

Link: CVE-2025-4141

cve-icon Redhat

No data.