A vulnerability was found in D-Link DIR-600L up to 2.07B01. It has been rated as critical. Affected by this issue is the function formSetWanL2TP. The manipulation of the argument host leads to buffer overflow. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.
History

Mon, 12 May 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-600l
Dlink dir-600l Firmware
CPEs cpe:2.3:h:dlink:dir-600l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-600l
Dlink dir-600l Firmware

Tue, 06 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 06 May 2025 11:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DIR-600L up to 2.07B01. It has been rated as critical. Affected by this issue is the function formSetWanL2TP. The manipulation of the argument host leads to buffer overflow. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-600L formSetWanL2TP buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-05-06T11:00:06.944Z

Updated: 2025-05-06T13:36:45.142Z

Reserved: 2025-05-05T16:58:48.645Z

Link: CVE-2025-4348

cve-icon Vulnrichment

Updated: 2025-05-06T13:36:21.776Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-06T11:15:52.640

Modified: 2025-05-12T17:30:00.950

Link: CVE-2025-4348

cve-icon Redhat

No data.