Cyber Posture

CVE-2025-55599

HighPublic PoC

Published: 22 August 2025

Published
22 August 2025
Modified
26 September 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0039 59.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-55599 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Dlink Dir-619L Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-120

Platform-independent managed code eliminates the need for unchecked native buffer copies that are the root cause of classic buffer overflows.

addresses: CWE-787

Out-of-bounds writes that corrupt control flow or inject shellcode are rendered non-executable by the same memory protections.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The buffer overflow vulnerability in the D-Link DIR-619L router's web interface (formWlanSetup via f_wds_wepKey parameter) enables remote exploitation of a public-facing application, facilitating initial access through arbitrary code execution.

NVD Description

D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formWlanSetup function via the parameter f_wds_wepKey.

Deeper analysisAI

CVE-2025-55599 is a buffer overflow vulnerability affecting the D-Link DIR-619L router running firmware version 2.06B01. The issue resides in the formWlanSetup function, which can be triggered via the f_wds_wepKey parameter. Classified under CWE-787 (Out-of-bounds Write) and CWE-120 (Buffer Copy without Checking Size of Input), it has a CVSS v3.1 base score of 7.5, reflecting network accessibility, low attack complexity, no required privileges or user interaction, unchanged scope, and high impact on availability with no impact on confidentiality or integrity.

Remote, unauthenticated attackers can exploit this vulnerability over the network by sending specially crafted requests to the affected function. Successful exploitation leads to a denial-of-service condition, such as device crashes or reboots, disrupting network availability without compromising data or enabling code execution.

Advisories and further details are available in the referenced GitHub repository at https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_65/65.md, which documents the vulnerability analysis. No official patches or mitigations from D-Link are specified in the available information.

Details

CWE(s)

Affected Products

dlink
dir-619l firmware
2.06b01

CVEs Like This One

CVE-2025-55611Same product: Dlink Dir-619L
CVE-2025-55602Same product: Dlink Dir-619L
CVE-2025-8978Same product: Dlink Dir-619L
CVE-2026-2055Same product: Dlink Dir-619L
CVE-2026-2054Same product: Dlink Dir-619L
CVE-2025-10792Same vendor: Dlink
CVE-2025-50670Same vendor: Dlink
CVE-2025-46108Same vendor: Dlink
CVE-2025-60554Same vendor: Dlink
CVE-2025-52222Same vendor: Dlink

References