CVE-2025-4346

A vulnerability was found in D-Link DIR-600L up to 2.07B01. It has been classified as critical. Affected is the function formSetWAN_Wizard534. The manipulation of the argument host leads to buffer overflow. It is possible to launch the attack remotely. This vulnerability only affects products that are no longer supported by the maintainer.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-600l:-:*:*:*:*:*:*:*

History

12 May 2025, 17:29

Type Values Removed Values Added
First Time Dlink dir-600l
Dlink dir-600l Firmware
Dlink
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 9.8
CPE cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-600l:-:*:*:*:*:*:*:*
References () https://vuldb.com/?ctiid.307464 - () https://vuldb.com/?ctiid.307464 - Permissions Required
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product
References () https://github.com/jylsec/vuldb/blob/main/D-Link/dlink_dir600l/Buffer_overflow-formSetWAN_Wizard534-curTime/README.md - () https://github.com/jylsec/vuldb/blob/main/D-Link/dlink_dir600l/Buffer_overflow-formSetWAN_Wizard534-curTime/README.md - Third Party Advisory, Broken Link
References () https://vuldb.com/?id.307464 - () https://vuldb.com/?id.307464 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.558299 - () https://vuldb.com/?submit.558299 - Third Party Advisory, VDB Entry

06 May 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-06 10:15

Updated : 2025-05-12 17:29


NVD link : CVE-2025-4346

Mitre link : CVE-2025-4346


JSON object : View

Products Affected

dlink

  • dir-600l
  • dir-600l_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer