We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in Netgear WNCE3001 1.0.0.50. It has been classified as critical. This affects the function http_d of the component HTTP POST Request Handler. The manipulation of the argument Host leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Es wurde eine Schwachstelle in Netgear WNCE3001 1.0.0.50 ausgemacht. Sie wurde als kritisch eingestuft. Es geht dabei um die Funktion http_d der Komponente HTTP POST Request Handler. Mittels Manipulieren des Arguments Host mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
2025-06-24: | Advisory disclosed |
2025-06-24: | VulDB entry created |
2025-06-24: | VulDB entry last update |
xiaobor123 (VulDB User)
vuldb.com/?id.313737 (VDB-313737 | Netgear WNCE3001 HTTP POST Request http_d stack-based overflow)
vuldb.com/?ctiid.313737 (VDB-313737 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.590030 (Submit #590030 | Netgear WNCE3001 1.0.0.50 Stack-based buffer overflow)
github.com/.../vul-finds/tree/main/vul-find-wnce3001-netgear
github.com/.../vul-finds/tree/main/vul-find-wnce3001-netgear
www.netgear.com/
Support options