First published: Thu Mar 20 2025(Updated: )
A vulnerability, which was classified as problematic, was found in D-Link DIR-618 and DIR-605L 2.02/3.02. Affected is an unknown function of the file /goform/formSetDomainFilter. The manipulation leads to improper access controls. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-618 | >=2.02<=2.02 | |
D-Link DIR-605L Firmware | >=3.02<=3.02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2548 is classified as a problematic vulnerability due to improper access controls found in specific D-Link router firmware versions.
To remediate CVE-2025-2548, update your D-Link DIR-618 or DIR-605L router to the latest firmware version available from the manufacturer.
CVE-2025-2548 affects the D-Link DIR-618 and DIR-605L routers running firmware versions 2.02 and 3.02, respectively.
Exploiting CVE-2025-2548 allows an attacker to gain improper access controls, potentially compromising network security.
No, CVE-2025-2548 can only be exploited by attackers on the local network.