Command Injection in D-Link DIR-619L Router
CVE-2025-4454

5.3MEDIUM

Key Information:

Vendor

D-link

Status
Vendor
CVE Published:
9 May 2025

What is CVE-2025-4454?

The D-Link DIR-619L router version 2.04B04 is susceptible to command injection through its wake_on_lan functionality. By manipulating the MAC address argument, an attacker can execute arbitrary commands remotely. This vulnerability is particularly concerning as it affects devices no longer supported by the vendor, leaving them exposed to potential exploitation if not addressed.

Affected Version(s)

DIR-619L 2.04B04

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zjy148909 (VulDB User)
.
CVE-2025-4454 : Command Injection in D-Link DIR-619L Router