First published: Fri May 09 2025(Updated: )
A vulnerability was found in D-Link DIR-619L 2.04B04 and classified as critical. Affected by this issue is the function formSetWizard2. The manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-619 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-4452 is classified as critical.
To fix CVE-2025-4452, update the D-Link DIR-619L to the latest firmware version provided by the vendor.
CVE-2025-4452 affects the D-Link DIR-619L router running firmware version 2.04B04.
Yes, CVE-2025-4452 can be exploited remotely due to its buffer overflow vulnerability.
The attack vector for CVE-2025-4452 is through the manipulation of the curTime argument in the formSetWizard2 function.