Vulnerability Description
A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta. This issue affects the function soapcgi_main of the file /soap.cgi. This manipulation causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-816L Firmware | 2.06.b09 |
| Dlink | Dir-816L | - |
Related Weaknesses (CWE)
References
- https://github.com/scanleale/IOT_sec/blob/main/DIR-816L%20stack%20overflow(soap.ExploitThird Party Advisory
- https://vuldb.com/?ctiid.332480Permissions RequiredVDB Entry
- https://vuldb.com/?id.332480Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.685543Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2025-13191?
CVE-2025-13191 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta. This issue affects the function soapcgi_main of the file /soap.cgi. This manipulation causes stack-based buffer overflow. It is possibl...
How severe is CVE-2025-13191?
CVE-2025-13191 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-13191?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-816L Firmware, Dlink Dir-816L.