Buffer Overflow Vulnerability in D-Link DIR-600L Routers
CVE-2025-4342
8.7HIGH
Summary
A buffer overflow vulnerability exists in the D-Link DIR-600L routers due to improper handling of input in the formEasySetupWizard3 function. This flaw can potentially allow remote attackers to manipulate the argument host, leading to unexpected behavior and possible unauthorized access to the device. Notably, the affected versions of the DIR-600L have reached their end of life and are no longer supported by the vendor, amplifying the risk for users still operating these devices. Users are strongly advised to upgrade or replace their equipment to mitigate potential security threats.
Affected Version(s)
DIR-600L 2.07B01
References
CVSS V4
Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
B1Nn (VulDB User)