Skip to main content

CVE-2025-4454: Command Injection in D-Link DIR-619L

Medium
VulnerabilityCVE-2025-4454cvecve-2025-4454
Published: Fri May 09 2025 (05/09/2025, 02:00:09 UTC)
Source: CVE
Vendor/Project: D-Link
Product: DIR-619L

Description

A vulnerability was found in D-Link DIR-619L 2.04B04. It has been declared as critical. This vulnerability affects the function wake_on_lan. The manipulation of the argument mac leads to command injection. The attack can be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 07/05/2025, 03:25:29 UTC

Technical Analysis

CVE-2025-4454 is a command injection vulnerability identified in the D-Link DIR-619L router, specifically version 2.04B04. The vulnerability resides in the wake_on_lan function, where improper sanitization of the 'mac' argument allows an attacker to inject arbitrary commands. This flaw can be exploited remotely without requiring user interaction or authentication, making it a significant risk. The vulnerability is classified with a CVSS 4.0 base score of 5.3, indicating medium severity. The vector details show that the attack can be launched over the network (AV:N), requires low attack complexity (AC:L), no privileges (PR:L), and no user interaction (UI:N). However, the impact on confidentiality, integrity, and availability is limited (VC:L, VI:L, VA:L), suggesting partial compromise potential. The vulnerability affects only the specified firmware version of a product that is no longer supported by the vendor, meaning no official patches or updates are available. No known exploits are currently reported in the wild. The lack of vendor support increases the risk for affected users, as mitigation options are limited to workarounds or device replacement. The wake_on_lan feature is typically used to remotely power on devices within a local network, but the injection flaw could allow attackers to execute arbitrary system commands on the router, potentially leading to device compromise, network pivoting, or denial of service.

Potential Impact

For European organizations, the impact of this vulnerability depends on the presence and usage of the D-Link DIR-619L router within their network infrastructure. Given that the device is an older, unsupported model, it is more likely to be found in small to medium enterprises or home office environments rather than large enterprises. Successful exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, and potentially use the compromised device as a foothold for further attacks within the network. This could lead to data breaches, disruption of network services, and exposure of sensitive information. The lack of vendor support means organizations cannot rely on official patches, increasing the risk of prolonged exposure. Additionally, since the attack requires no authentication or user interaction, automated scanning and exploitation attempts could target vulnerable devices, increasing the threat level. The overall impact is medium but could escalate if attackers combine this vulnerability with other exploits to achieve broader network compromise.

Mitigation Recommendations

Given the absence of official patches due to discontinued support, European organizations should prioritize the following mitigation steps: 1) Identify and inventory all D-Link DIR-619L devices running firmware version 2.04B04 or earlier. 2) Immediately isolate these devices from critical network segments or restrict their network access to trusted management networks only. 3) Disable the wake_on_lan feature if it is not essential, as this is the vulnerable function. 4) Replace affected devices with currently supported models that receive regular security updates. 5) Implement network-level protections such as firewall rules to block unsolicited inbound traffic to the router’s management interfaces. 6) Monitor network traffic for unusual activity originating from or targeting these routers. 7) Educate users and administrators about the risks of using unsupported hardware and the importance of timely device upgrades. 8) Consider deploying network intrusion detection systems (NIDS) tuned to detect command injection attempts or anomalous wake_on_lan traffic patterns.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-08T18:49:19.706Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd7df2

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 3:25:29 AM

Last updated: 8/12/2025, 7:19:03 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats