CVE-2025-52081
BaseFortify
Publication date: 2025-07-15
Last updated on: 2025-08-12
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| netgear | xr300_firmware | 1.0.3.38 |
| netgear | xr300 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack-based buffer overflow in the HTTPD service of Netgear XR300 V1.0.3.38_10.3.30. It occurs when the device processes POST requests to the usb_device.cgi endpoint that include the usb_folder parameter. This overflow can potentially allow an attacker to execute arbitrary code or cause a denial of service.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to exploit the buffer overflow to execute arbitrary code on the affected device or cause it to crash, leading to denial of service. This could compromise the security and availability of the device and any network it is connected to.