Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13190: Stack-based Buffer Overflow in D-Link DIR-816L

0
High
VulnerabilityCVE-2025-13190cvecve-2025-13190
Published: Sat Nov 15 2025 (11/15/2025, 06:32:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-816L

Description

A vulnerability was found in D-Link DIR-816L 2_06_b09_beta. This vulnerability affects the function scandir_main of the file /portal/__ajax_exporer.sgi. The manipulation of the argument en results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 11/15/2025, 06:45:17 UTC

Technical Analysis

CVE-2025-13190 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-816L router firmware version 2_06_b09_beta. The vulnerability resides in the scandir_main function of the /portal/__ajax_exporer.sgi script, where the 'en' argument is improperly validated, allowing an attacker to overflow the stack buffer. This flaw can be exploited remotely without authentication or user interaction, enabling attackers to execute arbitrary code on the device with elevated privileges. The buffer overflow can compromise the device's confidentiality, integrity, and availability by allowing full control over the router. The vulnerability affects only an outdated and unsupported firmware version, meaning no official patches or updates are available from D-Link. Public exploit code has been released, increasing the likelihood of exploitation in the wild. The CVSS 4.0 base score is 8.7, indicating a high-severity issue with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability does not require special conditions or physical access, making it a critical risk for exposed devices. The affected router model is commonly used in home and small business environments, which may serve as a pivot point for attackers targeting internal networks. Due to the lack of vendor support, mitigation relies on network-level controls and device replacement.

Potential Impact

For European organizations, especially small and medium enterprises or home offices using the D-Link DIR-816L router with the vulnerable firmware, this vulnerability poses a significant risk. Successful exploitation can lead to complete compromise of the router, allowing attackers to intercept, manipulate, or redirect network traffic, deploy malware, or establish persistent footholds within internal networks. This can result in data breaches, disruption of business operations, and potential lateral movement to more critical systems. The lack of vendor support means organizations cannot rely on firmware updates to remediate the issue, increasing exposure duration. Critical infrastructure or organizations with remote workforces using vulnerable devices may face heightened risks. Additionally, the public availability of exploit code lowers the barrier for attackers, including cybercriminals and state-sponsored actors, to weaponize this vulnerability. The impact extends beyond confidentiality to integrity and availability, potentially causing denial of service or network outages.

Mitigation Recommendations

Given the absence of official patches for the affected firmware, European organizations should prioritize the following mitigations: 1) Immediate replacement of D-Link DIR-816L devices running the vulnerable firmware with updated, supported hardware to eliminate the vulnerability vector. 2) If replacement is not immediately feasible, isolate affected routers from direct internet exposure by placing them behind secure firewalls or VPNs to restrict access to the vulnerable service. 3) Implement strict network segmentation to limit the router's access to critical internal resources and reduce the attack surface. 4) Monitor network traffic for unusual patterns or signs of exploitation attempts targeting the /portal/__ajax_exporer.sgi endpoint. 5) Disable or restrict access to the vulnerable web interface if possible, or employ web application firewalls (WAFs) to detect and block exploit attempts. 6) Educate users about the risks of using unsupported firmware and encourage timely hardware upgrades. 7) Maintain up-to-date asset inventories to identify and track vulnerable devices. 8) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts of this CVE. These targeted steps go beyond generic advice by focusing on compensating controls and proactive device management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T13:14:03.609Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69181fe6b7cdcddb4ca2270b

Added to database: 11/15/2025, 6:38:30 AM

Last enriched: 11/15/2025, 6:45:17 AM

Last updated: 11/16/2025, 4:11:21 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats