Buffer Overflow Vulnerability in D-Link DIR-600L Routers
CVE-2025-4342

8.7HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
6 May 2025

Summary

A buffer overflow vulnerability exists in the D-Link DIR-600L routers due to improper handling of input in the formEasySetupWizard3 function. This flaw can potentially allow remote attackers to manipulate the argument host, leading to unexpected behavior and possible unauthorized access to the device. Notably, the affected versions of the DIR-600L have reached their end of life and are no longer supported by the vendor, amplifying the risk for users still operating these devices. Users are strongly advised to upgrade or replace their equipment to mitigate potential security threats.

Affected Version(s)

DIR-600L 2.07B01

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

B1Nn (VulDB User)
.
CVE-2025-4342 : Buffer Overflow Vulnerability in D-Link DIR-600L Routers | SecurityVulnerability.io