Skip to main content

CVE-2025-6372: Stack-based Buffer Overflow in D-Link DIR-619L

High
VulnerabilityCVE-2025-6372cvecve-2025-6372
Published: Fri Jun 20 2025 (06/20/2025, 23:00:11 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-619L

Description

A vulnerability, which was classified as critical, was found in D-Link DIR-619L 2.06B01. This affects the function formSetWizard1 of the file /goform/formSetWizard1. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 06/21/2025, 11:36:00 UTC

Technical Analysis

CVE-2025-6372 is a critical stack-based buffer overflow vulnerability found in the D-Link DIR-619L router, specifically version 2.06B01. The vulnerability resides in the function formSetWizard1 within the /goform/formSetWizard1 endpoint. An attacker can exploit this flaw by manipulating the 'curTime' argument, which leads to a stack-based buffer overflow condition. This type of vulnerability can allow an attacker to overwrite the stack memory, potentially enabling arbitrary code execution or causing a denial of service. The attack can be initiated remotely over the network without requiring user interaction or prior authentication, making it highly exploitable. Although the vulnerability is classified as high severity with a CVSS 4.0 score of 8.7, it affects only devices that are no longer supported by the vendor, meaning no official patches or firmware updates are available. The exploit has been publicly disclosed, increasing the risk of exploitation despite no known active exploits in the wild at the time of publication. The vulnerability impacts the confidentiality, integrity, and availability of affected devices, as successful exploitation could allow attackers to take full control of the router, intercept or manipulate network traffic, or disrupt network services. Given the nature of the device as a consumer or small office/home office router, exploitation could also serve as a foothold for lateral movement into internal networks or as part of a larger botnet infrastructure.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home users relying on the D-Link DIR-619L router, this vulnerability poses a significant risk. Compromise of these routers can lead to interception of sensitive communications, unauthorized network access, and disruption of internet connectivity. In environments where these routers are used as gateways to corporate or home networks, attackers could leverage this vulnerability to pivot into internal systems, potentially accessing confidential data or disrupting business operations. The lack of vendor support and absence of patches exacerbate the risk, as affected devices remain vulnerable indefinitely. Additionally, the public disclosure of the exploit code increases the likelihood of opportunistic attacks. While large enterprises may not commonly use this specific router model, sectors with distributed or remote workforces, including healthcare, education, and small financial services, could be impacted if these devices are deployed. The vulnerability also raises concerns for critical infrastructure sectors that rely on secure network communications, as compromised routers could be used to launch further attacks or espionage activities.

Mitigation Recommendations

Given that the affected D-Link DIR-619L devices are no longer supported and no official patches are available, organizations should prioritize the following mitigation steps: 1) Immediate replacement of all affected DIR-619L routers with currently supported models from reputable vendors that receive regular security updates. 2) If replacement is not immediately feasible, isolate the vulnerable routers from critical network segments and restrict remote management access, especially from untrusted networks. 3) Employ network-level protections such as intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting the /goform/formSetWizard1 endpoint or attempts to exploit buffer overflow patterns. 4) Implement strict firewall rules to limit inbound traffic to router management interfaces, ideally allowing access only from trusted IP addresses. 5) Conduct network segmentation to minimize the impact of a compromised router on internal systems. 6) Regularly audit network devices to identify unsupported or end-of-life hardware and plan for their timely replacement. 7) Educate users about the risks of using unsupported network devices and encourage reporting of unusual network behavior. These measures go beyond generic advice by focusing on compensating controls and proactive device lifecycle management in the absence of vendor patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-19T13:44:56.782Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68568e80aded773421b5a79d

Added to database: 6/21/2025, 10:50:40 AM

Last enriched: 6/21/2025, 11:36:00 AM

Last updated: 8/7/2025, 11:46:55 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats