First published: Thu Mar 20 2025(Updated: )
A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02 and classified as problematic. Affected by this issue is some unknown functionality of the file /goform/formSetDDNS of the component DDNS Service. The manipulation leads to improper access controls. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-618 | ||
D-Link DIR-605L Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2550 is classified as a problematic vulnerability due to improper access controls.
To fix CVE-2025-2550, it's recommended to update your D-Link DIR-618 or DIR-605L firmware to the latest secure version.
CVE-2025-2550 affects the D-Link DIR-618 and DIR-605L routers.
CVE-2025-2550 allows attackers to manipulate improper access controls, potentially leading to unauthorized access.
Users of the D-Link DIR-618 and DIR-605L routers with the mentioned firmware versions are affected by CVE-2025-2550.