Vulnerability Description
A vulnerability has been found in D-Link DIR-619L 2.04B04 and classified as critical. Affected by this vulnerability is the function formSetWAN_Wizard52. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-619L Firmware | 2.04b04 |
| Dlink | Dir-619L | - |
Related Weaknesses (CWE)
References
- https://github.com/jylsec/vuldb/blob/main/D-Link/dlink_dir619l/Buffer_overflow-fBroken Link
- https://vuldb.com/?ctiid.308065Permissions Required
- https://vuldb.com/?id.308065Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.560793Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2025-4451?
CVE-2025-4451 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability has been found in D-Link DIR-619L 2.04B04 and classified as critical. Affected by this vulnerability is the function formSetWAN_Wizard52. The manipulation of the argument curTime leads...
How severe is CVE-2025-4451?
CVE-2025-4451 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-4451?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-619L Firmware, Dlink Dir-619L.