Buffer Overflow Vulnerability in D-Link DIR-605L Router
CVE-2025-4442

8.7HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
9 May 2025

Summary

A buffer overflow vulnerability has been identified in the D-Link DIR-605L router, specifically in the formSetWAN_Wizard55 function. The issue arises from improper handling of the curTime argument, allowing an attacker to exploit this vulnerability from a remote location. This security flaw primarily affects devices that are no longer supported by D-Link, which poses significant risks to users as these devices may not receive necessary security updates or patches. It's crucial for users of the DIR-605L to be aware of this vulnerability and consider taking measures to mitigate potential exploitation.

Affected Version(s)

DIR-605L 2.13B01

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

jylsec (VulDB User)
.