Buffer Overflow vulnerability in Netgear- R61 router V1.0.1.28 allows a remote attacker to execute arbitrary code via the QUERY_STRING key value
References
| Link | Resource |
|---|---|
| https://gist.github.com/xyqer1/09fe6488a6655776c8c5d33e630a0f2a | Exploit Third Party Advisory |
| https://github.com/xyqer1/Netgear-R6100-cgiMain-QUERY_STRING-StackOverflow?tab=readme-ov-file | Exploit Third Party Advisory |
| https://gist.github.com/xyqer1/09fe6488a6655776c8c5d33e630a0f2a | Exploit Third Party Advisory |
| https://github.com/xyqer1/Netgear-R6100-cgiMain-QUERY_STRING-StackOverflow?tab=readme-ov-file | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-04-17 15:15
Updated : 2025-04-21 18:42
NVD link : CVE-2025-29044
Mitre link : CVE-2025-29044
CVE.ORG link : CVE-2025-29044
JSON object : View
Products Affected
netgear
- r6100
- r6100_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
