CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. This issue affects the function formAdvanceSetup of the file /goform/formAdvanceSetup. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Analysis
CVE-2025-6617 is a critical stack-based buffer overflow vulnerability in D-Link DIR-619L firmware version 2.06B01 affecting the /goform/formAdvanceSetup endpoint. An authenticated attacker can remotely exploit this vulnerability by manipulating the 'webpage' parameter to achieve arbitrary code execution with full system compromise (confidentiality, integrity, and availability impacts). The vulnerability has public exploit disclosure and affects only end-of-life products no longer receiving vendor support.
Technical Context
This vulnerability exists in the formAdvanceSetup function within the D-Link DIR-619L wireless router's web management interface. The root cause is a classic stack-based buffer overflow (CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer) where user-supplied input via the 'webpage' parameter is not properly validated or length-checked before being written to a stack buffer. The DIR-619L is a legacy 802.11n WiFi router running proprietary D-Link firmware. The vulnerable endpoint /goform/formAdvanceSetup is part of the router's administrative web interface, typically accessible via HTTP/HTTPS on port 80/443. The affected CPE would be: cpe:2.3:o:d-link:dir-619l_firmware:2.06b01:*:*:*:*:*:*:*. The vulnerability requires authentication (PR:L in CVSS vector), indicating an attacker must first obtain valid credentials or exploit a prior authentication bypass.
Affected Products
DIR-619L (['2.06B01'])
Remediation
**Patch Status**: No security patch is available from D-Link due to the DIR-619L being EOL. **Remediation Options (in priority order)**: (1) **Replacement**: Retire the DIR-619L and replace with a current, actively maintained router model receiving security updates; (2) **Network Isolation**: If continued use is necessary, isolate the router on a trusted management VLAN with restricted access to router administrative credentials; (3) **Credential Management**: Change default administrative credentials to a strong, unique password to increase authentication barrier (partial mitigation only); (4) **Firmware Verification**: Confirm no unauthorized firmware modifications exist; (5) **Access Control**: Restrict administrative interface access to trusted IP ranges only via router configuration; (6) **Monitoring**: Implement network monitoring to detect anomalous outbound traffic from the router indicating compromise. **Why Workarounds Are Limited**: The lack of vendor support means no vendor advisory or patch will be published. Organizations must treat this as a permanent vulnerability requiring compensating controls or hardware replacement.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-28755