Buffer Overflow Vulnerability in D-Link DIR-605L Router
CVE-2025-4442
8.7HIGH
Summary
A buffer overflow vulnerability has been identified in the D-Link DIR-605L router, specifically in the formSetWAN_Wizard55 function. The issue arises from improper handling of the curTime argument, allowing an attacker to exploit this vulnerability from a remote location. This security flaw primarily affects devices that are no longer supported by D-Link, which poses significant risks to users as these devices may not receive necessary security updates or patches. It's crucial for users of the DIR-605L to be aware of this vulnerability and consider taking measures to mitigate potential exploitation.
Affected Version(s)
DIR-605L 2.13B01
References
CVSS V4
Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
jylsec (VulDB User)