First published: Sat Mar 22 2025(Updated: )
A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-1620 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2619 is classified as a critical vulnerability.
CVE-2025-2619 affects the D-Link DAP-1620 by allowing a stack-based buffer overflow through the function check_dws_cookie.
Yes, CVE-2025-2619 can be exploited remotely.
The vulnerable component in CVE-2025-2619 is the Cookie Handler found in the /storage directory.
Exploiting CVE-2025-2619 could lead to significant security risks, including unauthorized access and system compromise.