Stack-Based Buffer Overflow in D-Link DIR-619L Router
CVE-2025-6371
Key Information:
Badges
What is CVE-2025-6371?
A vulnerability affecting the D-Link DIR-619L routers allows remote attackers to execute arbitrary code through a stack-based buffer overflow in the 'formSetEnableWizard' function. This issue arises from improper handling of input within the '/goform/formSetEnableWizard' file, specifically via manipulation of the 'curTime' argument. This flaw compromises the security of devices that are no longer supported by D-Link, making them particularly susceptible to exploitation. Users are strongly urged to assess their device's vulnerability status and take action to mitigate potential risks.
Affected Version(s)
DIR-619L 2.06B01
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved