First published: Thu Mar 20 2025(Updated: )
A vulnerability has been found in D-Link DIR-618 and DIR-605L 2.02/3.02 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /goform/formSetPassword. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-618 | ||
D-Link DIR-605L Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2549 is classified as a problematic vulnerability due to improper access controls in certain D-Link router models.
To fix CVE-2025-2549, ensure your D-Link DIR-618 or DIR-605L firmware is updated to the latest version provided by D-Link.
CVE-2025-2549 affects the D-Link DIR-618 and DIR-605L routers running specific firmware versions 2.02/3.02.
An attacker exploiting CVE-2025-2549 could manipulate the access controls of the affected routers, potentially gaining unauthorized access.
A temporary workaround for CVE-2025-2549 may involve disabling remote access features until a firmware update is applied.