EUVD-2025-18952

| CVE-2025-6510 HIGH
2025-06-23 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 22:10 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:10 euvd
EUVD-2025-18952
PoC Detected
Jul 16, 2025 - 17:00 vuln.today
Public exploit code
CVE Published
Jun 23, 2025 - 16:15 nvd
HIGH 8.8

Description

A vulnerability was found in Netgear EX6100 1.0.2.28_1.1.138. It has been rated as critical. Affected by this issue is the function sub_415EF8. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Analysis

CVE-2025-6510 is a critical stack-based buffer overflow vulnerability in Netgear EX6100 WiFi extender (version 1.0.2.28_1.1.138) affecting the sub_415EF8 function. An authenticated remote attacker can exploit this vulnerability to achieve arbitrary code execution with high integrity and availability impact. The vulnerability has public exploit disclosure and affects only end-of-life products no longer receiving vendor support.

Technical Context

This vulnerability is a stack-based buffer overflow (CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer) in the Netgear EX6100 WiFi range extender firmware. The vulnerable function sub_415EF8 fails to properly validate input boundaries before writing to stack memory, allowing an attacker to overwrite the stack frame and potentially achieve code execution. The EX6100 is a consumer-grade WiFi extender running proprietary firmware; the vulnerability exists in low-level network processing or configuration parsing routines. CPE identifier would be: cpe:2.3:h:netgear:ex6100:1.0.2.28_1.1.138:*:*:*:*:*:*:* with corresponding firmware CPE for the affected version.

Affected Products

EX6100 WiFi Range Extender (['1.0.2.28_1.1.138'])

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.3
CVSS: +44
POC: +20

Share

EUVD-2025-18952 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy