Skip to main content

CVE-2025-6374: Stack-based Buffer Overflow in D-Link DIR-619L

High
VulnerabilityCVE-2025-6374cvecve-2025-6374
Published: Sat Jun 21 2025 (06/21/2025, 00:00:14 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-619L

Description

A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. This issue affects the function formSetACLFilter of the file /goform/formSetACLFilter. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 06/21/2025, 11:36:19 UTC

Technical Analysis

CVE-2025-6374 is a critical security vulnerability identified in the D-Link DIR-619L router, specifically version 2.06B01. The flaw resides in the function formSetACLFilter within the /goform/formSetACLFilter endpoint. The vulnerability is a stack-based buffer overflow triggered by improper handling of the 'curTime' argument. An attacker can remotely exploit this flaw without requiring user interaction or prior authentication, as indicated by the CVSS vector. The buffer overflow can lead to arbitrary code execution, potentially allowing an attacker to take full control of the affected device. The vulnerability affects only devices running the specified firmware version, which is no longer supported by D-Link, meaning no official patches or updates are available. Although there are no known exploits currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The CVSS 4.0 score of 8.7 (high severity) reflects the vulnerability's network attack vector, low attack complexity, no required privileges, and no user interaction, combined with high impact on confidentiality, integrity, and availability. The lack of support and patch availability significantly raises the risk profile for affected devices, especially in environments where these routers remain in operation without mitigation.

Potential Impact

For European organizations, the exploitation of CVE-2025-6374 could have severe consequences. Compromised D-Link DIR-619L routers could serve as entry points into corporate or home networks, enabling attackers to intercept or manipulate network traffic, deploy malware, or pivot to other internal systems. The full compromise of a router undermines network confidentiality, integrity, and availability, potentially leading to data breaches, disruption of business operations, or espionage. Since the affected product is an older, unsupported model, organizations relying on these devices may face increased risk due to the absence of vendor patches. This is particularly critical for small and medium enterprises (SMEs) and residential users who may still use these routers due to cost or lack of awareness. The public availability of exploit code further elevates the threat, as less sophisticated attackers can leverage it. The impact is magnified in sectors where network reliability and data security are paramount, such as finance, healthcare, and government institutions.

Mitigation Recommendations

Given the lack of official patches, European organizations should prioritize the following specific mitigations: 1) Immediate identification and inventory of all D-Link DIR-619L routers running firmware 2.06B01 within their networks. 2) Replace affected devices with currently supported models from trusted vendors to eliminate the vulnerability entirely. 3) If replacement is not immediately feasible, isolate affected routers on segmented network zones with strict firewall rules to limit exposure to untrusted networks, especially the internet. 4) Disable remote management features on these routers to reduce the attack surface. 5) Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected connections to the /goform/formSetACLFilter endpoint or anomalous traffic patterns. 6) Employ network intrusion detection/prevention systems (IDS/IPS) with updated signatures that can detect attempts to exploit this buffer overflow. 7) Educate users and network administrators about the risks associated with unsupported hardware and the importance of timely device upgrades. 8) Implement compensating controls such as VPNs and endpoint security to reduce the impact of a potential router compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-19T13:46:18.636Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68568e80aded773421b5a78f

Added to database: 6/21/2025, 10:50:40 AM

Last enriched: 6/21/2025, 11:36:19 AM

Last updated: 8/8/2025, 11:49:54 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats