CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability classified as critical has been found in Netgear EX6150 1.0.0.46_1.0.76. This affects the function sub_410090. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Analysis
CVE-2025-6511 is a critical stack-based buffer overflow vulnerability in Netgear EX6150 (version 1.0.0.46_1.0.76) affecting the sub_410090 function, allowing authenticated attackers to achieve remote code execution with high integrity, confidentiality, and availability impact. The vulnerability is publicly disclosed with proof-of-concept code available, and impacts only end-of-life products no longer receiving vendor support, elevating real-world exploitation risk for unpatched legacy deployments.
Technical Context
This vulnerability is a stack-based buffer overflow (CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer) in Netgear EX6150 WiFi range extender firmware. The vulnerable function sub_410090 fails to properly validate input boundaries, allowing stack memory corruption. The affected device (CPE: cpe:2.3:h:netgear:ex6150:1.0.0.46_1.0.76:*:*:*:*:*:*:*) is an 802.11ac WiFi range extender commonly deployed in residential and small office networks. The vulnerability exists in firmware processing, likely in web management interface handling or UPnP service handlers typical of Netgear extender products. Stack-based buffer overflows in embedded device firmware are particularly dangerous as they often execute with elevated privileges and lack modern memory protections (ASLR, stack canaries) common in contemporary operating systems.
Affected Products
EX6150 (AC1200 Dual Band WiFi Range Extender) (['1.0.0.46_1.0.76'])
Remediation
Primary Remediation: Device Replacement; description: Since EX6150 is end-of-life with no patch available from Netgear, the recommended mitigation is replacement with a currently-supported WiFi extender model from Netgear or alternative vendor receiving active firmware updates. Temporary Mitigation: Network Isolation; description: If replacement is not immediately feasible: (1) Place EX6150 on isolated VLAN with restricted network access; (2) Disable remote management/web UI access; (3) Restrict device to essential WiFi relay function only; (4) Monitor for unusual traffic patterns from device. Temporary Mitigation: Credential Hardening; description: Change default admin credentials to long, complex passwords to increase attacker friction for initial authentication required by vulnerability. Note: This does not prevent exploitation by attackers already on network or with credential compromise. Detection: Inventory and Monitor; description: Scan networks for EX6150 devices using network enumeration tools. Monitor for unexpected management interface access attempts and unusual outbound traffic from device IP addresses. Consider blocking management ports (80, 443, 8080) via network firewall for devices not requiring remote management. Vendor Advisory: Check Netgear Security Advisory; description: Netgear has historically provided end-of-life notifications for affected products; review security.netgear.com for any late-stage patches or formal guidance. No patch is expected given end-of-life status.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18912