A vulnerability, which was classified as critical, was found in D-Link DIR-600L up to 2.07B01. This affects the function formLogin. The manipulation of the argument host leads to buffer overflow. It is possible to initiate the attack remotely. This vulnerability only affects products that are no longer supported by the maintainer.
History

Mon, 12 May 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-600l
Dlink dir-600l Firmware
CPEs cpe:2.3:h:dlink:dir-600l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-600l
Dlink dir-600l Firmware

Tue, 06 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 06 May 2025 09:45:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, was found in D-Link DIR-600L up to 2.07B01. This affects the function formLogin. The manipulation of the argument host leads to buffer overflow. It is possible to initiate the attack remotely. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-600L formLogin buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-05-06T14:17:23.447Z

Reserved: 2025-05-05T16:58:38.088Z

Link: CVE-2025-4344

cve-icon Vulnrichment

Updated: 2025-05-06T14:17:11.854Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-06T10:15:16.240

Modified: 2025-05-12T17:28:56.030

Link: CVE-2025-4344

cve-icon Redhat

No data.