First published: Thu Mar 20 2025(Updated: )
A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been declared as problematic. This vulnerability affects unknown code of the file /goform/formTcpipSetup. The manipulation leads to improper access controls. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-618 | ||
D-Link DIR-605L Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2552 has been classified as a problematic vulnerability with significant implications for improper access controls.
To mitigate CVE-2025-2552, ensure that your D-Link DIR-618 or DIR-605L router firmware is updated to the latest version provided by D-Link.
CVE-2025-2552 affects D-Link DIR-618 and DIR-605L router models running specific firmware versions 2.02 and 3.02.
CVE-2025-2552 can allow unauthorized access to the device due to improper access controls, potentially leading to local network exposure.
CVE-2025-2552 requires local network access for exploitation, limiting its impact compared to remote vulnerabilities.