First published: Tue May 06 2025(Updated: )
A vulnerability was found in D-Link DIR-600L up to 2.07B01. It has been rated as critical. Affected by this issue is the function formSetWanL2TP. The manipulation of the argument host leads to buffer overflow. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-600L Firmware | <=2.07B01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4348 is rated as critical due to the potential for remote exploitation leading to a buffer overflow.
To mitigate CVE-2025-4348, update the D-Link DIR-600L to the latest firmware version beyond 2.07B01.
CVE-2025-4348 affects the D-Link DIR-600L router running firmware versions up to 2.07B01.
Yes, CVE-2025-4348 can be exploited remotely, which makes it particularly concerning for network security.
The vulnerable function in CVE-2025-4348 is formSetWanL2TP, which is susceptible to buffer overflow due to argument manipulation.