CVE-2025-6367: Stack-based Buffer Overflow in D-Link DIR-619L
A vulnerability was found in D-Link DIR-619L 2.06B01. It has been declared as critical. This vulnerability affects unknown code of the file /goform/formSetDomainFilter. The manipulation of the argument curTime/sched_name_%d/url_%d leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-6367 is a critical stack-based buffer overflow vulnerability identified in the D-Link DIR-619L router, specifically version 2.06B01. The vulnerability resides in the handling of HTTP requests directed at the /goform/formSetDomainFilter endpoint. By manipulating certain parameters—namely curTime, sched_name_%d, and url_%d—an attacker can trigger a stack-based buffer overflow. This type of vulnerability occurs when more data is written to a buffer located on the stack than it can hold, potentially overwriting adjacent memory and leading to arbitrary code execution or system crashes. The vulnerability can be exploited remotely without any authentication or user interaction, as the attack vector is a network request to the affected endpoint. The CVSS 4.0 score of 8.7 reflects a high severity, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although the vulnerability is publicly disclosed and exploits may be developed, there are currently no known exploits in the wild. Importantly, the affected product is no longer supported by the vendor, meaning no official patches or updates are available to remediate this issue. This increases the risk for organizations still using this hardware, as they cannot rely on vendor-supplied fixes and must consider alternative mitigation strategies. The vulnerability's exploitation could allow attackers to execute arbitrary code on the router, potentially leading to full device compromise, interception or manipulation of network traffic, disruption of network services, or use of the device as a pivot point for further attacks within an organization’s network.
Potential Impact
For European organizations, the exploitation of CVE-2025-6367 could have significant consequences. The D-Link DIR-619L is a consumer and small office/home office (SOHO) router, which may still be in use in smaller enterprises or branch offices. Successful exploitation could lead to complete compromise of the router, enabling attackers to intercept sensitive data, disrupt internet connectivity, or launch further attacks against internal network resources. This could result in data breaches, operational downtime, and reputational damage. Since the device is no longer supported, organizations cannot apply vendor patches, increasing exposure. Additionally, compromised routers can be enlisted into botnets or used to bypass network security controls, amplifying the threat. The impact is particularly critical for organizations handling sensitive personal data subject to GDPR, as breaches could lead to regulatory penalties. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation if vulnerable devices are exposed to the internet or accessible from untrusted networks.
Mitigation Recommendations
Given the absence of vendor patches, European organizations should adopt a multi-layered mitigation approach. First, identify and inventory all D-Link DIR-619L devices in their environment, especially version 2.06B01. If possible, replace these devices with supported hardware that receives regular security updates. If replacement is not immediately feasible, isolate the vulnerable routers by restricting access to the /goform/formSetDomainFilter endpoint via firewall rules or network segmentation, limiting exposure to trusted management networks only. Disable remote management features on these routers to prevent external exploitation. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. Monitor network traffic for anomalous patterns indicative of buffer overflow exploitation attempts. Additionally, enforce strict network access controls and consider deploying endpoint detection and response (EDR) solutions on connected hosts to detect lateral movement originating from compromised routers. Finally, educate staff about the risks of using unsupported network devices and the importance of timely hardware lifecycle management.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-6367: Stack-based Buffer Overflow in D-Link DIR-619L
Description
A vulnerability was found in D-Link DIR-619L 2.06B01. It has been declared as critical. This vulnerability affects unknown code of the file /goform/formSetDomainFilter. The manipulation of the argument curTime/sched_name_%d/url_%d leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-6367 is a critical stack-based buffer overflow vulnerability identified in the D-Link DIR-619L router, specifically version 2.06B01. The vulnerability resides in the handling of HTTP requests directed at the /goform/formSetDomainFilter endpoint. By manipulating certain parameters—namely curTime, sched_name_%d, and url_%d—an attacker can trigger a stack-based buffer overflow. This type of vulnerability occurs when more data is written to a buffer located on the stack than it can hold, potentially overwriting adjacent memory and leading to arbitrary code execution or system crashes. The vulnerability can be exploited remotely without any authentication or user interaction, as the attack vector is a network request to the affected endpoint. The CVSS 4.0 score of 8.7 reflects a high severity, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although the vulnerability is publicly disclosed and exploits may be developed, there are currently no known exploits in the wild. Importantly, the affected product is no longer supported by the vendor, meaning no official patches or updates are available to remediate this issue. This increases the risk for organizations still using this hardware, as they cannot rely on vendor-supplied fixes and must consider alternative mitigation strategies. The vulnerability's exploitation could allow attackers to execute arbitrary code on the router, potentially leading to full device compromise, interception or manipulation of network traffic, disruption of network services, or use of the device as a pivot point for further attacks within an organization’s network.
Potential Impact
For European organizations, the exploitation of CVE-2025-6367 could have significant consequences. The D-Link DIR-619L is a consumer and small office/home office (SOHO) router, which may still be in use in smaller enterprises or branch offices. Successful exploitation could lead to complete compromise of the router, enabling attackers to intercept sensitive data, disrupt internet connectivity, or launch further attacks against internal network resources. This could result in data breaches, operational downtime, and reputational damage. Since the device is no longer supported, organizations cannot apply vendor patches, increasing exposure. Additionally, compromised routers can be enlisted into botnets or used to bypass network security controls, amplifying the threat. The impact is particularly critical for organizations handling sensitive personal data subject to GDPR, as breaches could lead to regulatory penalties. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation if vulnerable devices are exposed to the internet or accessible from untrusted networks.
Mitigation Recommendations
Given the absence of vendor patches, European organizations should adopt a multi-layered mitigation approach. First, identify and inventory all D-Link DIR-619L devices in their environment, especially version 2.06B01. If possible, replace these devices with supported hardware that receives regular security updates. If replacement is not immediately feasible, isolate the vulnerable routers by restricting access to the /goform/formSetDomainFilter endpoint via firewall rules or network segmentation, limiting exposure to trusted management networks only. Disable remote management features on these routers to prevent external exploitation. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. Monitor network traffic for anomalous patterns indicative of buffer overflow exploitation attempts. Additionally, enforce strict network access controls and consider deploying endpoint detection and response (EDR) solutions on connected hosts to detect lateral movement originating from compromised routers. Finally, educate staff about the risks of using unsupported network devices and the importance of timely hardware lifecycle management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-19T13:44:30.333Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68568e81aded773421b5a7e6
Added to database: 6/21/2025, 10:50:41 AM
Last enriched: 6/21/2025, 11:21:29 AM
Last updated: 8/5/2025, 12:30:43 AM
Views: 14
Related Threats
CVE-2025-25231: Vulnerability in Omnissa Omnissa Workspace ONE UEM
HighCVE-2025-53187: CWE-94 Improper Control of Generation of Code ('Code Injection') in ABB ASPECT
HighCVE-2025-54063: CWE-94: Improper Control of Generation of Code ('Code Injection') in CherryHQ cherry-studio
HighCVE-2025-1500: CWE-434 Unrestricted Upload of File with Dangerous Type in IBM Maximo Application Suite
MediumCVE-2025-1403: CWE-502 Deserialization of Untrusted Data in IBM Qiskit SDK
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.