A vulnerability was found in D-Link DIR-600L up to 2.07B01. It has been declared as critical. Affected by this vulnerability is the function formWlSiteSurvey. The manipulation of the argument host leads to buffer overflow. The attack can be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.
History

Mon, 12 May 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-600l
Dlink dir-600l Firmware
CPEs cpe:2.3:h:dlink:dir-600l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-600l
Dlink dir-600l Firmware

Tue, 06 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 06 May 2025 10:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DIR-600L up to 2.07B01. It has been declared as critical. Affected by this vulnerability is the function formWlSiteSurvey. The manipulation of the argument host leads to buffer overflow. The attack can be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-600L formWlSiteSurvey buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-05-06T15:12:32.996Z

Reserved: 2025-05-05T16:58:46.221Z

Link: CVE-2025-4347

cve-icon Vulnrichment

Updated: 2025-05-06T15:12:21.193Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-06T11:15:52.457

Modified: 2025-05-12T17:29:52.680

Link: CVE-2025-4347

cve-icon Redhat

No data.