Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13190: Stack-based Buffer Overflow in D-Link DIR-816L

0
High
VulnerabilityCVE-2025-13190cvecve-2025-13190
Published: Sat Nov 15 2025 (11/15/2025, 06:32:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-816L

Description

A vulnerability was found in D-Link DIR-816L 2_06_b09_beta. This vulnerability affects the function scandir_main of the file /portal/__ajax_exporer.sgi. The manipulation of the argument en results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 11/22/2025, 08:35:19 UTC

Technical Analysis

CVE-2025-13190 identifies a critical stack-based buffer overflow vulnerability in the D-Link DIR-816L router firmware version 2_06_b09_beta. The vulnerability resides in the scandir_main function within the /portal/__ajax_exporer.sgi file, where the 'en' argument is improperly validated, allowing an attacker to overwrite the stack memory. This flaw can be triggered remotely without authentication or user interaction, making it highly exploitable. Successful exploitation can lead to arbitrary code execution with elevated privileges on the router, potentially allowing attackers to control the device, intercept or redirect network traffic, or pivot into internal networks. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with ease of exploitation. Despite the severity, the affected firmware is no longer supported by D-Link, and no official patches are available. Public exploit code has been released, increasing the likelihood of active exploitation. Organizations using this router model with the vulnerable firmware are at significant risk, especially if the device is exposed to untrusted networks. The lack of vendor support necessitates alternative mitigation strategies such as device replacement or network segmentation to reduce exposure.

Potential Impact

For European organizations, exploitation of CVE-2025-13190 could result in complete compromise of affected D-Link DIR-816L routers, leading to unauthorized access to internal networks, interception of sensitive communications, and potential lateral movement to other critical systems. This could disrupt business operations, compromise confidential data, and degrade network availability. Given the router’s role as a network gateway, attackers could manipulate traffic or deploy further malware. The absence of vendor patches increases the risk, especially for organizations with legacy infrastructure or limited network segmentation. Critical sectors such as government, finance, and healthcare in Europe could face heightened risks if these devices are deployed in sensitive environments. Additionally, the public availability of exploits lowers the barrier for attackers, including cybercriminals and nation-state actors, to leverage this vulnerability for espionage or sabotage.

Mitigation Recommendations

Since the affected D-Link DIR-816L firmware version 2_06_b09_beta is no longer supported and no official patches exist, European organizations should prioritize immediate replacement of these devices with supported models running up-to-date firmware. If replacement is not immediately feasible, network administrators should isolate vulnerable routers behind strict firewall rules to restrict access to the management interface and the vulnerable endpoint (/portal/__ajax_exporer.sgi). Implement network segmentation to limit the impact of a compromised router. Monitoring network traffic for unusual activity or exploitation attempts targeting this vulnerability is advised. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for this CVE if available. Disable or restrict remote management interfaces where possible. Regularly audit network devices to identify any remaining vulnerable routers. Finally, educate IT staff about the risks associated with unsupported hardware and the importance of timely device lifecycle management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T13:14:03.609Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69181fe6b7cdcddb4ca2270b

Added to database: 11/15/2025, 6:38:30 AM

Last enriched: 11/22/2025, 8:35:19 AM

Last updated: 1/7/2026, 5:22:13 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats