Saturday, May 24, 2025
HomeCVE/vulnerabilityNetgear EX6200 Flaw Enables Remote Access and Data Theft

Netgear EX6200 Flaw Enables Remote Access and Data Theft

Published on

SIEM as a Service

Follow Us on Google News

Security researchers have disclosed three critical vulnerabilities in the Netgear EX6200 Wi-Fi range extender that could allow remote attackers to gain unauthorized access and steal sensitive data.

The flaws affect firmware version 1.0.3.94 and have been assigned the CVEs CVE-2025-4148, CVE-2025-4149, and CVE-2025-4150. Despite early notification, Netgear has yet to respond to these reports, leaving users exposed.

The Netgear EX6200 is a widely used device designed to boost Wi-Fi coverage for homes and small businesses.

- Advertisement - Google News

With its popularity comes an increased security risk when vulnerabilities emerge-especially when they enable remote code execution or data theft attacks.

The table below summarizes the key information about the three CVEs:

CVE IDAffected Product (Version)CWE TypeCVSSv3 ScoreImpact
CVE-2025-4148Netgear EX6200 (1.0.3.94)CWE-120 (Buffer Overflow), CWE-119 (Memory Corruption)8.8 (High)Remote code execution, data theft
CVE-2025-4149Netgear EX6200 (1.0.3.94)CWE-120, CWE-1198.8 (High)Remote access, data theft
CVE-2025-4150Netgear EX6200 (1.0.3.94)CWE-120, CWE-1198.8 (High)Remote access, data theft

Technical Analysis

All three vulnerabilities stem from improper handling of arguments passed to specific internal functions (sub_503FC, sub_54014, and sub_54340).

When an attacker manipulates the host argument, it triggers a buffer overflow-potentially allowing arbitrary code execution, full device compromise, or theft of sensitive data transiting through or stored on the device.

The flaws can be triggered remotely without user interaction, making them especially dangerous for exposed devices, such as those configured for remote management or poorly secured behind weak firewalls.

Each CVE is classified as critical with CVSS scores of 8.8 (HIGH) under version 3.1, indicating the high likelihood of exploitation and severe consequences.

The vulnerabilities allow attackers to bypass most security controls, gain low-privilege access, and escalate privileges-potentially taking complete control of the device.

  • Remote Code Execution: Attackers may execute arbitrary code, install malware, or pivot into internal networks.
  • Data Theft: Sensitive data-such as network credentials, passwords, or private documents-can be exfiltrated.
  • Botnet Enlistment: Vulnerable devices could be conscripted into botnets for DDoS campaigns or other malicious activity.

Netgear was contacted regarding these vulnerabilities but, as of publication, has not issued a patch or advisory. Users are strongly urged to disable remote management, restrict network access to the device, and monitor for updates or third-party mitigations.

  1. Update Firmware (if a patch becomes available).
  2. Restrict External Access by disabling remote configuration options.
  3. Segment the Network to minimize exposure.
  4. Monitor Device Logs for unusual or unauthorized activity.

Until Netgear releases a fix, the EX6200 remains vulnerable. Users should assess their risk, apply mitigating actions, and consider replacing or isolating affected devices.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...