EUVD-2025-18912

| CVE-2025-6511 HIGH
2025-06-23 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 22:10 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:10 euvd
EUVD-2025-18912
PoC Detected
Jul 16, 2025 - 17:00 vuln.today
Public exploit code
CVE Published
Jun 23, 2025 - 17:15 nvd
HIGH 8.8

Description

A vulnerability classified as critical has been found in Netgear EX6150 1.0.0.46_1.0.76. This affects the function sub_410090. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Analysis

CVE-2025-6511 is a critical stack-based buffer overflow vulnerability in Netgear EX6150 (version 1.0.0.46_1.0.76) affecting the sub_410090 function, allowing authenticated attackers to achieve remote code execution with high integrity, confidentiality, and availability impact. The vulnerability is publicly disclosed with proof-of-concept code available, and impacts only end-of-life products no longer receiving vendor support, elevating real-world exploitation risk for unpatched legacy deployments.

Technical Context

This vulnerability is a stack-based buffer overflow (CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer) in Netgear EX6150 WiFi range extender firmware. The vulnerable function sub_410090 fails to properly validate input boundaries, allowing stack memory corruption. The affected device (CPE: cpe:2.3:h:netgear:ex6150:1.0.0.46_1.0.76:*:*:*:*:*:*:*) is an 802.11ac WiFi range extender commonly deployed in residential and small office networks. The vulnerability exists in firmware processing, likely in web management interface handling or UPnP service handlers typical of Netgear extender products. Stack-based buffer overflows in embedded device firmware are particularly dangerous as they often execute with elevated privileges and lack modern memory protections (ASLR, stack canaries) common in contemporary operating systems.

Affected Products

EX6150 (AC1200 Dual Band WiFi Range Extender) (['1.0.0.46_1.0.76'])

Remediation

Primary Remediation: Device Replacement; description: Since EX6150 is end-of-life with no patch available from Netgear, the recommended mitigation is replacement with a currently-supported WiFi extender model from Netgear or alternative vendor receiving active firmware updates. Temporary Mitigation: Network Isolation; description: If replacement is not immediately feasible: (1) Place EX6150 on isolated VLAN with restricted network access; (2) Disable remote management/web UI access; (3) Restrict device to essential WiFi relay function only; (4) Monitor for unusual traffic patterns from device. Temporary Mitigation: Credential Hardening; description: Change default admin credentials to long, complex passwords to increase attacker friction for initial authentication required by vulnerability. Note: This does not prevent exploitation by attackers already on network or with credential compromise. Detection: Inventory and Monitor; description: Scan networks for EX6150 devices using network enumeration tools. Monitor for unexpected management interface access attempts and unusual outbound traffic from device IP addresses. Consider blocking management ports (80, 443, 8080) via network firewall for devices not requiring remote management. Vendor Advisory: Check Netgear Security Advisory; description: Netgear has historically provided end-of-life notifications for affected products; review security.netgear.com for any late-stage patches or formal guidance. No patch is expected given end-of-life status.

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.3
CVSS: +44
POC: +20

Share

EUVD-2025-18912 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy