ID

VAR-202506-1227


CVE

CVE-2025-6565


TITLE

NETGEAR WNCE3001 Buffer Overflow Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-16590

DESCRIPTION

A vulnerability was found in Netgear WNCE3001 1.0.0.50. It has been classified as critical. This affects the function http_d of the component HTTP POST Request Handler. The manipulation of the argument Host leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NETGEAR WNCE3001 is a dual-band wireless network adapter designed for smart TVs, Blu-ray players and other devices, and achieves wireless connection through the Ethernet interface. Attackers can use this vulnerability to submit special requests to crash the application or execute arbitrary code in the context of the application

Trust: 1.44

sources: NVD: CVE-2025-6565 // CNVD: CNVD-2025-16590

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-16590

AFFECTED PRODUCTS

vendor:netgearmodel:wnce3001scope:eqversion:1.0.0.50

Trust: 0.6

sources: CNVD: CNVD-2025-16590

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-6565
value: HIGH

Trust: 1.0

CNVD: CNVD-2025-16590
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-6565
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-16590
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-6565
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-16590 // NVD: CVE-2025-6565

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

sources: NVD: CVE-2025-6565

EXTERNAL IDS

db:NVDid:CVE-2025-6565

Trust: 1.6

db:VULDBid:313737

Trust: 1.0

db:CNVDid:CNVD-2025-16590

Trust: 0.6

sources: CNVD: CNVD-2025-16590 // NVD: CVE-2025-6565

REFERENCES

url:https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear

Trust: 1.6

url:https://vuldb.com/?submit.590030

Trust: 1.0

url:https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear#poc

Trust: 1.0

url:https://www.netgear.com/

Trust: 1.0

url:https://vuldb.com/?id.313737

Trust: 1.0

url:https://vuldb.com/?ctiid.313737

Trust: 1.0

sources: CNVD: CNVD-2025-16590 // NVD: CVE-2025-6565

SOURCES

db:CNVDid:CNVD-2025-16590
db:NVDid:CVE-2025-6565

LAST UPDATE DATE

2025-07-23T23:07:08.991000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-16590date:2025-07-21T00:00:00
db:NVDid:CVE-2025-6565date:2025-06-26T18:58:14.280

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-16590date:2025-07-21T00:00:00
db:NVDid:CVE-2025-6565date:2025-06-24T13:15:24.790