CVE-2025-6115

HIGH

Dlink Dir-619l Firmware - Memory Corruption

Title source: rule
STIX 2.1

Description

A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by this issue is the function form_macfilter. The manipulation of the argument mac_hostname_%d/sched_name_%d leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.312584
Permissions Required signature permissions-required
https://vuldb.com/?ctiid.312584
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.592570
Product product
https://www.dlink.com/

Scores

CVSS v3 8.8
EPSS 0.0083
EPSS Percentile 74.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-119 CWE-121
Status published
Products (1)
dlink/dir-619l_firmware 2.06b01
Published Jun 16, 2025
Tracked Since Feb 18, 2026