Skip to main content

CVE-2025-6373: Stack-based Buffer Overflow in D-Link DIR-619L

High
VulnerabilityCVE-2025-6373cvecve-2025-6373
Published: Fri Jun 20 2025 (06/20/2025, 23:31:05 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-619L

Description

A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as critical. This vulnerability affects the function formSetWizard1 of the file /goform/formWlSiteSurvey. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 06/21/2025, 11:36:09 UTC

Technical Analysis

CVE-2025-6373 is a critical stack-based buffer overflow vulnerability identified in the D-Link DIR-619L router, specifically version 2.06B01. The flaw resides in the function formSetWizard1 within the /goform/formWlSiteSurvey endpoint. An attacker can remotely manipulate the 'curTime' argument passed to this function, causing a stack-based buffer overflow. This type of vulnerability can lead to arbitrary code execution, potentially allowing an attacker to take full control of the affected device. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. Although the exploit has been publicly disclosed, no known active exploitation in the wild has been reported yet. Importantly, the affected product is no longer supported by D-Link, meaning no official patches or firmware updates are available to remediate this issue. The CVSS v4.0 score is 8.7 (high severity), reflecting the vulnerability's ease of remote exploitation and its potential to compromise confidentiality, integrity, and availability of the device. Given the nature of the device—a consumer-grade wireless router—successful exploitation could allow attackers to intercept or manipulate network traffic, launch further attacks on connected devices, or create persistent footholds within affected networks.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for small and medium enterprises (SMEs) and home office environments that rely on D-Link DIR-619L routers for network connectivity. Exploitation could lead to unauthorized network access, interception of sensitive communications, and disruption of network services. Since the device is a network gateway, compromise could facilitate lateral movement within corporate or home networks, enabling attackers to target critical systems or exfiltrate data. The lack of vendor support and patches means organizations cannot rely on firmware updates to mitigate risk, increasing exposure. Additionally, the vulnerability could be leveraged as part of larger botnet campaigns or distributed denial-of-service (DDoS) attacks, affecting broader network stability. The criticality is heightened in sectors with sensitive data or regulatory requirements (e.g., finance, healthcare) where network integrity and confidentiality are paramount.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Immediate network segmentation to isolate affected DIR-619L routers from critical infrastructure and sensitive data environments, limiting potential lateral movement. 2) Replace or upgrade affected routers with currently supported models that receive security updates, prioritizing this for high-risk environments. 3) Employ network-level intrusion detection/prevention systems (IDS/IPS) configured to monitor and block suspicious traffic targeting the /goform/formWlSiteSurvey endpoint or unusual HTTP requests containing malformed 'curTime' parameters. 4) Disable remote management interfaces on the affected routers to reduce exposure to external attackers. 5) Conduct regular network traffic analysis to detect anomalous behavior indicative of exploitation attempts. 6) Educate users and administrators about the risks associated with unsupported hardware and the importance of timely device replacement. 7) Where replacement is not immediately feasible, consider deploying firewall rules to restrict inbound access to the router's management interfaces to trusted IP addresses only.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-19T13:45:00.466Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68568e80aded773421b5a796

Added to database: 6/21/2025, 10:50:40 AM

Last enriched: 6/21/2025, 11:36:09 AM

Last updated: 8/9/2025, 1:40:05 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats