ID

VAR-202506-1265


CVE

CVE-2025-6510


TITLE

of netgear  EX6100  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-009236

DESCRIPTION

A vulnerability was found in Netgear EX6100 1.0.2.28_1.1.138. It has been rated as critical. Affected by this issue is the function sub_415EF8. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. of netgear EX6100 The firmware contains a buffer error vulnerability and a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The vulnerability is caused by the sub_415EF8 function failing to properly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack

Trust: 2.16

sources: NVD: CVE-2025-6510 // JVNDB: JVNDB-2025-009236 // CNVD: CNVD-2025-15616

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-15616

AFFECTED PRODUCTS

vendor:netgearmodel:ex6100scope:eqversion:1.0.2.28_1.1.138

Trust: 1.0

vendor:ネットギアmodel:ex6100scope:eqversion:ex6100 firmware 1.0.2.28 1.1.138

Trust: 0.8

vendor:ネットギアmodel:ex6100scope:eqversion: -

Trust: 0.8

vendor:ネットギアmodel:ex6100scope: - version: -

Trust: 0.8

vendor:netgearmodel:ex6100 1.0.2.28 1.1.138scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-15616 // JVNDB: JVNDB-2025-009236 // NVD: CVE-2025-6510

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-6510
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-009236
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-15616
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-6510
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-009236
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-15616
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-6510
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-009236
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-15616 // JVNDB: JVNDB-2025-009236 // NVD: CVE-2025-6510

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-009236 // NVD: CVE-2025-6510

EXTERNAL IDS

db:NVDid:CVE-2025-6510

Trust: 3.2

db:VULDBid:313622

Trust: 1.8

db:JVNDBid:JVNDB-2025-009236

Trust: 0.8

db:CNVDid:CNVD-2025-15616

Trust: 0.6

sources: CNVD: CNVD-2025-15616 // JVNDB: JVNDB-2025-009236 // NVD: CVE-2025-6510

REFERENCES

url:https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear

Trust: 1.8

url:https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear#poc

Trust: 1.8

url:https://vuldb.com/?id.313622

Trust: 1.8

url:https://vuldb.com/?submit.593678

Trust: 1.8

url:https://vuldb.com/?submit.595995

Trust: 1.8

url:https://www.netgear.com/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-6510

Trust: 1.4

url:https://vuldb.com/?ctiid.313622

Trust: 1.0

sources: CNVD: CNVD-2025-15616 // JVNDB: JVNDB-2025-009236 // NVD: CVE-2025-6510

SOURCES

db:CNVDid:CNVD-2025-15616
db:JVNDBid:JVNDB-2025-009236
db:NVDid:CVE-2025-6510

LAST UPDATE DATE

2025-07-20T23:32:23.666000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-15616date:2025-07-14T00:00:00
db:JVNDBid:JVNDB-2025-009236date:2025-07-18T04:50:00
db:NVDid:CVE-2025-6510date:2025-07-16T17:00:44.380

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-15616date:2025-07-04T00:00:00
db:JVNDBid:JVNDB-2025-009236date:2025-07-18T00:00:00
db:NVDid:CVE-2025-6510date:2025-06-23T16:15:29.770