Stack-based Buffer Overflow in D-Link DIR-619L Router
CVE-2025-6369
Key Information:
Badges
What is CVE-2025-6369?
A vulnerability has been identified in the D-Link DIR-619L version 2.06B01, specifically in the 'formdumpeasysetup' function found in '/goform/formdumpeasysetup'. This weakness is caused by improper handling of the 'curTime/config.save_network_enabled' argument, leading to a stack-based buffer overflow. Unfortunately, this vulnerability opens a pathway for remote attackers to exploit the device, potentially compromising its integrity. It is noteworthy that this issue affects products no longer supported by the vendor, increasing the urgency for users to address this vulnerability.
Affected Version(s)
DIR-619L 2.06B01
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved