CVE-2025-6114

HIGH

Dlink Dir-619l Firmware - Memory Corruption

Title source: rule
STIX 2.1

Description

A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by this vulnerability is the function form_portforwarding of the file /goform/form_portforwarding. The manipulation of the argument ingress_name_%d/sched_name_%d/name_%d leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.312583
Permissions Required signature permissions-required
https://vuldb.com/?ctiid.312583
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.592568
Product product
https://www.dlink.com/

Scores

CVSS v3 8.8
EPSS 0.0083
EPSS Percentile 74.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-119 CWE-121
Status published
Products (1)
dlink/dir-619l_firmware 2.06b01
Published Jun 16, 2025
Tracked Since Feb 18, 2026