A vulnerability was found in Netgear EX6200 1.0.3.94 and classified as critical. Affected by this issue is the function sub_503FC. The manipulation of the argument host leads to buffer overflow. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
History

Mon, 12 May 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Netgear
Netgear ex6200
Netgear ex6200 Firmware
CPEs cpe:2.3:h:netgear:ex6200:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ex6200_firmware:1.0.3.94:*:*:*:*:*:*:*
Vendors & Products Netgear
Netgear ex6200
Netgear ex6200 Firmware

Thu, 01 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 01 May 2025 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Netgear EX6200 1.0.3.94 and classified as critical. Affected by this issue is the function sub_503FC. The manipulation of the argument host leads to buffer overflow. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Title Netgear EX6200 sub_503FC buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-05-01T13:23:35.982Z

Reserved: 2025-04-30T18:17:42.674Z

Link: CVE-2025-4148

cve-icon Vulnrichment

Updated: 2025-05-01T13:23:33.541Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-01T04:16:58.113

Modified: 2025-05-12T19:38:00.387

Link: CVE-2025-4148

cve-icon Redhat

No data.