CVE-2025-6158: Stack-based Buffer Overflow in D-Link DIR-665
A vulnerability classified as critical has been found in D-Link DIR-665 1.00. This affects the function sub_AC78 of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-6158 is a critical security vulnerability identified in the D-Link DIR-665 router, specifically version 1.00. The flaw exists in the HTTP POST Request Handler component, within the function sub_AC78, where improper input validation leads to a stack-based buffer overflow. This type of vulnerability allows an attacker to overwrite the stack memory, potentially enabling arbitrary code execution or causing a denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, increasing the risk of widespread exploitation. Although the affected product is no longer supported by D-Link, the exploit code has been publicly disclosed, raising the likelihood of active attacks. The CVSS 4.0 base score is 8.7, reflecting high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability with high impact, as successful exploitation could allow attackers to take full control of the device or disrupt its operation. No official patches or mitigations are available from the vendor since the product is out of support, complicating remediation efforts for affected users.
Potential Impact
European organizations relying on the D-Link DIR-665 router version 1.00 face significant risks from this vulnerability. Compromise of these devices could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. This is particularly critical for small and medium enterprises (SMEs), home offices, and branch offices that may still use this legacy hardware due to budget constraints or lack of awareness. The ability to remotely exploit the vulnerability without authentication means attackers can scan and compromise vulnerable devices en masse, potentially using them as footholds for further attacks or as part of botnets. Given the lack of vendor support, organizations cannot rely on firmware updates, increasing exposure duration. The impact extends to critical infrastructure sectors if such devices are deployed in operational environments, potentially affecting availability and safety. Additionally, the public disclosure of exploit code increases the urgency for mitigation to prevent exploitation by less skilled threat actors.
Mitigation Recommendations
Since no official patches are available, affected organizations should prioritize immediate network-level mitigations. These include isolating the vulnerable routers from direct internet exposure by placing them behind firewalls or VPNs, and restricting access to the device’s management interface to trusted IP addresses only. Network administrators should monitor for unusual traffic patterns indicative of exploitation attempts, such as abnormal HTTP POST requests targeting the router. Where possible, organizations should replace the DIR-665 devices with currently supported models that receive security updates. If replacement is not immediately feasible, disabling remote management features and limiting administrative access to local networks can reduce attack surface. Employing network intrusion detection systems (NIDS) with signatures for known exploit attempts can provide early warning. Regularly auditing network devices to identify legacy hardware is essential to maintain an accurate asset inventory and prioritize upgrades. Finally, educating users about the risks of unsupported devices and encouraging timely hardware refresh cycles will help prevent similar vulnerabilities from persisting.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-6158: Stack-based Buffer Overflow in D-Link DIR-665
Description
A vulnerability classified as critical has been found in D-Link DIR-665 1.00. This affects the function sub_AC78 of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-6158 is a critical security vulnerability identified in the D-Link DIR-665 router, specifically version 1.00. The flaw exists in the HTTP POST Request Handler component, within the function sub_AC78, where improper input validation leads to a stack-based buffer overflow. This type of vulnerability allows an attacker to overwrite the stack memory, potentially enabling arbitrary code execution or causing a denial of service. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, increasing the risk of widespread exploitation. Although the affected product is no longer supported by D-Link, the exploit code has been publicly disclosed, raising the likelihood of active attacks. The CVSS 4.0 base score is 8.7, reflecting high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability with high impact, as successful exploitation could allow attackers to take full control of the device or disrupt its operation. No official patches or mitigations are available from the vendor since the product is out of support, complicating remediation efforts for affected users.
Potential Impact
European organizations relying on the D-Link DIR-665 router version 1.00 face significant risks from this vulnerability. Compromise of these devices could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. This is particularly critical for small and medium enterprises (SMEs), home offices, and branch offices that may still use this legacy hardware due to budget constraints or lack of awareness. The ability to remotely exploit the vulnerability without authentication means attackers can scan and compromise vulnerable devices en masse, potentially using them as footholds for further attacks or as part of botnets. Given the lack of vendor support, organizations cannot rely on firmware updates, increasing exposure duration. The impact extends to critical infrastructure sectors if such devices are deployed in operational environments, potentially affecting availability and safety. Additionally, the public disclosure of exploit code increases the urgency for mitigation to prevent exploitation by less skilled threat actors.
Mitigation Recommendations
Since no official patches are available, affected organizations should prioritize immediate network-level mitigations. These include isolating the vulnerable routers from direct internet exposure by placing them behind firewalls or VPNs, and restricting access to the device’s management interface to trusted IP addresses only. Network administrators should monitor for unusual traffic patterns indicative of exploitation attempts, such as abnormal HTTP POST requests targeting the router. Where possible, organizations should replace the DIR-665 devices with currently supported models that receive security updates. If replacement is not immediately feasible, disabling remote management features and limiting administrative access to local networks can reduce attack surface. Employing network intrusion detection systems (NIDS) with signatures for known exploit attempts can provide early warning. Regularly auditing network devices to identify legacy hardware is essential to maintain an accurate asset inventory and prioritize upgrades. Finally, educating users about the risks of unsupported devices and encouraging timely hardware refresh cycles will help prevent similar vulnerabilities from persisting.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-15T18:58:28.712Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6850e5c4a8c92127438512d5
Added to database: 6/17/2025, 3:49:24 AM
Last enriched: 6/17/2025, 4:04:33 AM
Last updated: 8/11/2025, 8:29:41 PM
Views: 23
Related Threats
CVE-2025-8914: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WellChoose Organization Portal System
HighCVE-2025-8913: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in WellChoose Organization Portal System
CriticalCVE-2025-8912: CWE-36 Absolute Path Traversal in WellChoose Organization Portal System
HighCVE-2025-8911: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in WellChoose Organization Portal System
MediumCVE-2025-8910: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in WellChoose Organization Portal System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.