CVE-2025-6374: Stack-based Buffer Overflow in D-Link DIR-619L
A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. This issue affects the function formSetACLFilter of the file /goform/formSetACLFilter. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-6374 is a critical security vulnerability identified in the D-Link DIR-619L router, specifically version 2.06B01. The flaw resides in the function formSetACLFilter within the /goform/formSetACLFilter endpoint. The vulnerability is a stack-based buffer overflow triggered by improper handling of the 'curTime' argument. An attacker can remotely exploit this flaw without requiring user interaction or prior authentication, as indicated by the CVSS vector. The buffer overflow can lead to arbitrary code execution, potentially allowing an attacker to take full control of the affected device. The vulnerability affects only devices running the specified firmware version, which is no longer supported by D-Link, meaning no official patches or updates are available. Although there are no known exploits currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The CVSS 4.0 score of 8.7 (high severity) reflects the vulnerability's network attack vector, low attack complexity, no required privileges, and no user interaction, combined with high impact on confidentiality, integrity, and availability. The lack of support and patch availability significantly raises the risk profile for affected devices, especially in environments where these routers remain in operation without mitigation.
Potential Impact
For European organizations, the exploitation of CVE-2025-6374 could have severe consequences. Compromised D-Link DIR-619L routers could serve as entry points into corporate or home networks, enabling attackers to intercept or manipulate network traffic, deploy malware, or pivot to other internal systems. The full compromise of a router undermines network confidentiality, integrity, and availability, potentially leading to data breaches, disruption of business operations, or espionage. Since the affected product is an older, unsupported model, organizations relying on these devices may face increased risk due to the absence of vendor patches. This is particularly critical for small and medium enterprises (SMEs) and residential users who may still use these routers due to cost or lack of awareness. The public availability of exploit code further elevates the threat, as less sophisticated attackers can leverage it. The impact is magnified in sectors where network reliability and data security are paramount, such as finance, healthcare, and government institutions.
Mitigation Recommendations
Given the lack of official patches, European organizations should prioritize the following specific mitigations: 1) Immediate identification and inventory of all D-Link DIR-619L routers running firmware 2.06B01 within their networks. 2) Replace affected devices with currently supported models from trusted vendors to eliminate the vulnerability entirely. 3) If replacement is not immediately feasible, isolate affected routers on segmented network zones with strict firewall rules to limit exposure to untrusted networks, especially the internet. 4) Disable remote management features on these routers to reduce the attack surface. 5) Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected connections to the /goform/formSetACLFilter endpoint or anomalous traffic patterns. 6) Employ network intrusion detection/prevention systems (IDS/IPS) with updated signatures that can detect attempts to exploit this buffer overflow. 7) Educate users and network administrators about the risks associated with unsupported hardware and the importance of timely device upgrades. 8) Implement compensating controls such as VPNs and endpoint security to reduce the impact of a potential router compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-6374: Stack-based Buffer Overflow in D-Link DIR-619L
Description
A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. This issue affects the function formSetACLFilter of the file /goform/formSetACLFilter. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-6374 is a critical security vulnerability identified in the D-Link DIR-619L router, specifically version 2.06B01. The flaw resides in the function formSetACLFilter within the /goform/formSetACLFilter endpoint. The vulnerability is a stack-based buffer overflow triggered by improper handling of the 'curTime' argument. An attacker can remotely exploit this flaw without requiring user interaction or prior authentication, as indicated by the CVSS vector. The buffer overflow can lead to arbitrary code execution, potentially allowing an attacker to take full control of the affected device. The vulnerability affects only devices running the specified firmware version, which is no longer supported by D-Link, meaning no official patches or updates are available. Although there are no known exploits currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The CVSS 4.0 score of 8.7 (high severity) reflects the vulnerability's network attack vector, low attack complexity, no required privileges, and no user interaction, combined with high impact on confidentiality, integrity, and availability. The lack of support and patch availability significantly raises the risk profile for affected devices, especially in environments where these routers remain in operation without mitigation.
Potential Impact
For European organizations, the exploitation of CVE-2025-6374 could have severe consequences. Compromised D-Link DIR-619L routers could serve as entry points into corporate or home networks, enabling attackers to intercept or manipulate network traffic, deploy malware, or pivot to other internal systems. The full compromise of a router undermines network confidentiality, integrity, and availability, potentially leading to data breaches, disruption of business operations, or espionage. Since the affected product is an older, unsupported model, organizations relying on these devices may face increased risk due to the absence of vendor patches. This is particularly critical for small and medium enterprises (SMEs) and residential users who may still use these routers due to cost or lack of awareness. The public availability of exploit code further elevates the threat, as less sophisticated attackers can leverage it. The impact is magnified in sectors where network reliability and data security are paramount, such as finance, healthcare, and government institutions.
Mitigation Recommendations
Given the lack of official patches, European organizations should prioritize the following specific mitigations: 1) Immediate identification and inventory of all D-Link DIR-619L routers running firmware 2.06B01 within their networks. 2) Replace affected devices with currently supported models from trusted vendors to eliminate the vulnerability entirely. 3) If replacement is not immediately feasible, isolate affected routers on segmented network zones with strict firewall rules to limit exposure to untrusted networks, especially the internet. 4) Disable remote management features on these routers to reduce the attack surface. 5) Monitor network traffic for unusual activity indicative of exploitation attempts, such as unexpected connections to the /goform/formSetACLFilter endpoint or anomalous traffic patterns. 6) Employ network intrusion detection/prevention systems (IDS/IPS) with updated signatures that can detect attempts to exploit this buffer overflow. 7) Educate users and network administrators about the risks associated with unsupported hardware and the importance of timely device upgrades. 8) Implement compensating controls such as VPNs and endpoint security to reduce the impact of a potential router compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-19T13:46:18.636Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68568e80aded773421b5a78f
Added to database: 6/21/2025, 10:50:40 AM
Last enriched: 6/21/2025, 11:36:19 AM
Last updated: 8/8/2025, 11:49:54 PM
Views: 14
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.