{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6511","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-06-23T09:04:43.623Z","datePublished":"2025-06-23T16:31:05.057Z","dateUpdated":"2025-07-15T09:22:10.244Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-07-15T09:22:10.244Z"},"title":"Netgear EX6150 sub_410090 stack-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-121","lang":"en","description":"Stack-based Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"Netgear","product":"EX6150","versions":[{"version":"1.0.0.46_1.0.76","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in Netgear EX6150 1.0.0.46_1.0.76. This affects the function sub_410090. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"de","value":"Es wurde eine Schwachstelle in Netgear EX6150 1.0.0.46_1.0.76 entdeckt. Sie wurde als kritisch eingestuft. Dabei betrifft es die Funktion sub_410090. Mit der Manipulation mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:C"}}],"timeline":[{"time":"2025-06-23T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-06-23T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-07-15T11:27:01.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"xiaobor123 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.313623","name":"VDB-313623 | Netgear EX6150 sub_410090 stack-based overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.313623","name":"VDB-313623 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.595999","name":"Submit #595999 | Netgear EX6150 V1.0.0.46_1.0.76 Stack-based Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.596008","name":"Submit #596008 | Netgear EX6150 V1.0.0.46_1.0.76 Stack-based Buffer Overflow (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear","tags":["related"]},{"url":"https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear#poc","tags":["exploit"]},{"url":"https://www.netgear.com/","tags":["product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-23T20:43:52.520174Z","id":"CVE-2025-6511","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-23T20:44:03.684Z"}}]}}