Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-6115


A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by this issue is the function form_macfilter. The manipulation of the argument mac_hostname_%d/sched_name_%d leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.


Published

2025-06-16T09:15:20.300

Last Modified

2025-06-17T20:32:10.530

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-119
    CWE-121

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System dlink dir-619l_firmware 2.06b01 Yes
Hardware dlink dir-619l - No

References