CVE-2025-55599
Published: 22 August 2025
Summary
CVE-2025-55599 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Dlink Dir-619L Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Platform-independent managed code eliminates the need for unchecked native buffer copies that are the root cause of classic buffer overflows.
Out-of-bounds writes that corrupt control flow or inject shellcode are rendered non-executable by the same memory protections.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The buffer overflow vulnerability in the D-Link DIR-619L router's web interface (formWlanSetup via f_wds_wepKey parameter) enables remote exploitation of a public-facing application, facilitating initial access through arbitrary code execution.
NVD Description
D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formWlanSetup function via the parameter f_wds_wepKey.
Deeper analysisAI
CVE-2025-55599 is a buffer overflow vulnerability affecting the D-Link DIR-619L router running firmware version 2.06B01. The issue resides in the formWlanSetup function, which can be triggered via the f_wds_wepKey parameter. Classified under CWE-787 (Out-of-bounds Write) and CWE-120 (Buffer Copy without Checking Size of Input), it has a CVSS v3.1 base score of 7.5, reflecting network accessibility, low attack complexity, no required privileges or user interaction, unchanged scope, and high impact on availability with no impact on confidentiality or integrity.
Remote, unauthenticated attackers can exploit this vulnerability over the network by sending specially crafted requests to the affected function. Successful exploitation leads to a denial-of-service condition, such as device crashes or reboots, disrupting network availability without compromising data or enabling code execution.
Advisories and further details are available in the referenced GitHub repository at https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_65/65.md, which documents the vulnerability analysis. No official patches or mitigations from D-Link are specified in the available information.
Details
- CWE(s)