A vulnerability, which was classified as critical, was found in Netgear JWNR2000v2 1.0.0.11. This affects the function sub_41A914. The manipulation of the argument host leads to buffer overflow. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_JWNR2000v2/Buffer_overflow-sub_41A914-GUI_Region/README.md | Broken Link |
https://vuldb.com/?ctiid.306597 | Permissions Required VDB Entry |
https://vuldb.com/?id.306597 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.560771 | Third Party Advisory VDB Entry |
https://www.netgear.com/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
16 May 2025, 18:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:netgear:jwnr2000:v2:*:*:*:*:*:*:* |
16 May 2025, 16:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netgear jwnr2000
Netgear Netgear jwnr2000 Firmware |
|
References | () https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_JWNR2000v2/Buffer_overflow-sub_41A914-GUI_Region/README.md - Broken Link | |
References | () https://vuldb.com/?ctiid.306597 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.306597 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.560771 - Third Party Advisory, VDB Entry | |
References | () https://www.netgear.com/ - Product | |
CPE | cpe:2.3:o:netgear:jwnr2000_firmware:1.0.0.11:*:*:*:*:*:*:* cpe:2.3:h:netgear:jwnr2000:-:*:*:*:*:*:*:* |
02 May 2025, 13:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Apr 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-30 13:15
Updated : 2025-05-16 18:27
NVD link : CVE-2025-4117
Mitre link : CVE-2025-4117
CVE.ORG link : CVE-2025-4117
JSON object : View
Products Affected
netgear
- jwnr2000
- jwnr2000_firmware