#VU112000 Stack-based buffer overflow in DIR-619L and DIR-619L-ES - CVE-2025-6115
Published: June 27, 2025
DIR-619L
DIR-619L-ES
D-Link
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the "form_macfilter" function within the "mac_hostname_%d/sched_name_%d" argument. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_62/62.md
- https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_62/62.md#poc
- https://vuldb.com/?ctiid.312584
- https://vuldb.com/?id.312584
- https://vuldb.com/?submit.592570
- https://www.dlink.com/
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10385