First published: Fri May 09 2025(Updated: )
A vulnerability classified as critical was found in D-Link DIR-619L 2.04B04. This vulnerability affects the function formEasySetupWizard. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-619 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4448 has been classified as critical due to its potential for remote exploitation and buffer overflow risk.
To fix CVE-2025-4448, update the D-Link DIR-619L router to the latest firmware version provided by the vendor.
CVE-2025-4448 can be exploited through a remote attack that targets the formEasySetupWizard function.
Users of the D-Link DIR-619L are at risk of unauthorized access and potential data breaches due to the buffer overflow vulnerability.
Disabling remote management features on the D-Link DIR-619L can serve as a temporary workaround while awaiting a firmware patch.