CVE-2025-6158

| EUVD-2025-18473 HIGH
2025-06-17 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-18473
PoC Detected
Jul 16, 2025 - 17:00 vuln.today
Public exploit code
CVE Published
Jun 17, 2025 - 04:15 nvd
HIGH 8.8

Description

A vulnerability classified as critical has been found in D-Link DIR-665 1.00. This affects the function sub_AC78 of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Analysis

Critical stack-based buffer overflow vulnerability in the HTTP POST request handler (function sub_AC78) of D-Link DIR-665 firmware version 1.00, exploitable remotely by authenticated attackers. The vulnerability allows remote code execution with high confidentiality, integrity, and availability impact (CVSS 8.8). Public exploit code is available and the affected product line is no longer maintained by D-Link, significantly elevating real-world risk despite requiring low-privilege authentication.

Technical Context

The vulnerability exists in the HTTP POST request handler component of D-Link DIR-665 wireless router firmware, specifically in function sub_AC78. The root cause is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic stack-based buffer overflow condition. The D-Link DIR-665 is a legacy 802.11n wireless router with embedded web management interface. The POST handler fails to properly validate input length before writing to stack-allocated buffers, allowing an authenticated attacker to overflow the stack with arbitrary data. This is a common firmware vulnerability pattern in embedded devices where input validation is insufficient before memory operations.

Affected Products

D-Link DIR-665 firmware version 1.00 is the confirmed affected version. CPE would be: cpe:2.3:o:d-link:dir-665_firmware:1.00:*:*:*:*:*:*:*. The DIR-665 hardware is a legacy 802.11n dual-band wireless router (WLAN device class). No patch versions are available from D-Link as this product reached end-of-life. All DIR-665 devices running firmware 1.00 or potentially earlier versions are vulnerable. D-Link has not released security advisories or patches for this product line due to discontinued support status.

Remediation

PATCH: No official patches exist from D-Link for end-of-life DIR-665 devices. WORKAROUNDS: (1) Immediately discontinue use of DIR-665 devices and replace with supported router hardware from D-Link or alternative vendors, (2) Network isolation - restrict administrative access to the router's web interface to trusted networks only (disable WAN access to port 80/443), (3) Change default credentials if applicable and use strong, unique authentication credentials, (4) Disable HTTP management interface if not required and use HTTPS-only if available, (5) Deploy network-based IDS/IPS rules to detect buffer overflow attempts in HTTP POST requests to legacy D-Link devices. MITIGATION: Organizations should inventory all DIR-665 devices and create an immediate replacement timeline, given the critical nature of the vulnerability and lack of vendor support.

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +44
POC: +20

Share

CVE-2025-6158 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy