First published: Fri May 09 2025(Updated: )
A vulnerability was found in D-Link DIR-619L 2.04B04. It has been classified as critical. This affects the function formSysCmd. The manipulation of the argument sysCmd leads to command injection. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-619 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4453 has been classified as critical.
CVE-2025-4453 affects the D-Link DIR-619L router.
CVE-2025-4453 is a command injection vulnerability due to improper handling of the sysCmd argument.
Yes, CVE-2025-4453 can be exploited remotely.
To mitigate CVE-2025-4453, it is advisable to update the D-Link DIR-619L to the latest firmware version provided by the vendor.