Buffer Overflow vulnerability in Netgear- R61 router V1.0.1.28 allows a remote attacker to execute arbitrary code via the QUERY_STRING key value
References
Link | Resource |
---|---|
https://gist.github.com/xyqer1/09fe6488a6655776c8c5d33e630a0f2a | Exploit Third Party Advisory |
https://github.com/xyqer1/Netgear-R6100-cgiMain-QUERY_STRING-StackOverflow?tab=readme-ov-file | Exploit Third Party Advisory |
https://gist.github.com/xyqer1/09fe6488a6655776c8c5d33e630a0f2a | Exploit Third Party Advisory |
https://github.com/xyqer1/Netgear-R6100-cgiMain-QUERY_STRING-StackOverflow?tab=readme-ov-file | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Apr 2025, 18:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Netgear r6100
Netgear r6100 Firmware Netgear |
|
References | () https://gist.github.com/xyqer1/09fe6488a6655776c8c5d33e630a0f2a - Exploit, Third Party Advisory | |
References | () https://github.com/xyqer1/Netgear-R6100-cgiMain-QUERY_STRING-StackOverflow?tab=readme-ov-file - Exploit, Third Party Advisory | |
CPE | cpe:2.3:o:netgear:r6100_firmware:1.0.1.28:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:* |
18 Apr 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/xyqer1/09fe6488a6655776c8c5d33e630a0f2a - | |
References | () https://github.com/xyqer1/Netgear-R6100-cgiMain-QUERY_STRING-StackOverflow?tab=readme-ov-file - | |
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
17 Apr 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-17 15:15
Updated : 2025-04-21 18:42
NVD link : CVE-2025-29044
Mitre link : CVE-2025-29044
CVE.ORG link : CVE-2025-29044
JSON object : View
Products Affected
netgear
- r6100
- r6100_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')