Skip to main content

CVE-2025-6614: Stack-based Buffer Overflow in D-Link DIR-619L

High
VulnerabilityCVE-2025-6614cvecve-2025-6614
Published: Wed Jun 25 2025 (06/25/2025, 16:00:16 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-619L

Description

A vulnerability, which was classified as critical, has been found in D-Link DIR-619L 2.06B01. Affected by this issue is the function formSetWANType_Wizard5 of the file /goform/formSetWANType_Wizard5. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 06/25/2025, 16:07:50 UTC

Technical Analysis

CVE-2025-6614 is a critical stack-based buffer overflow vulnerability identified in the D-Link DIR-619L router, specifically version 2.06B01. The flaw resides in the function formSetWANType_Wizard5 within the file /goform/formSetWANType_Wizard5. The vulnerability is triggered by manipulating the 'curTime' argument, which leads to a stack-based buffer overflow condition. This type of vulnerability allows an attacker to overwrite parts of the stack memory, potentially enabling arbitrary code execution or causing a denial of service (DoS) by crashing the device. The attack vector is remote and does not require user interaction or authentication, increasing the risk profile. Although the product is no longer supported by the vendor, the exploit code has been publicly disclosed, which raises the likelihood of exploitation by threat actors. The CVSS 4.0 base score is 8.7 (high severity), reflecting the ease of remote exploitation (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). The vulnerability affects only the specified firmware version 2.06B01, and no official patches are available due to the product's end-of-life status. This increases the risk for organizations still operating this hardware, as mitigation options are limited to network-level controls or device replacement.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on the D-Link DIR-619L routers in their network infrastructure. Successful exploitation can lead to complete compromise of the affected device, allowing attackers to execute arbitrary code, disrupt network connectivity, or pivot to internal networks. This can result in loss of confidentiality of sensitive data, integrity breaches through unauthorized configuration changes, and availability issues due to device crashes or network outages. Given the router’s role as a gateway device, exploitation could facilitate broader network infiltration or persistent access. The lack of vendor support and patches exacerbates the risk, as vulnerable devices cannot be remediated through firmware updates. This is particularly critical for small and medium enterprises (SMEs) and home office environments that may still use legacy hardware. Additionally, critical infrastructure sectors using these devices could face operational disruptions. The public disclosure of exploit code increases the likelihood of opportunistic attacks, including automated scanning and exploitation by cybercriminals or state-sponsored actors targeting European networks.

Mitigation Recommendations

Given the absence of official patches, European organizations should prioritize immediate mitigation steps beyond generic advice: 1) Identify and inventory all D-Link DIR-619L devices running firmware version 2.06B01 within the network. 2) Replace affected routers with currently supported models that receive security updates. 3) If replacement is not immediately feasible, isolate vulnerable devices on segmented network zones with strict access controls to limit exposure. 4) Implement network-level intrusion detection/prevention systems (IDS/IPS) configured to detect and block exploit attempts targeting the /goform/formSetWANType_Wizard5 endpoint or anomalous HTTP requests with suspicious 'curTime' parameters. 5) Disable remote management interfaces or restrict them to trusted IP addresses only. 6) Monitor network traffic for unusual patterns or signs of exploitation attempts. 7) Educate IT staff about the vulnerability and the importance of decommissioning unsupported hardware. 8) Consider deploying web application firewalls (WAFs) to filter malicious HTTP requests targeting the router’s management interface. These targeted mitigations reduce the attack surface and exposure while transitioning to secure hardware.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-25T07:10:47.593Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685c1eaac6576a567aed30c4

Added to database: 6/25/2025, 4:07:06 PM

Last enriched: 6/25/2025, 4:07:50 PM

Last updated: 8/1/2025, 12:33:27 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats