Cyber Posture

CVE-2025-55602

HighPublic PoC

Published: 22 August 2025

Published
22 August 2025
Modified
26 September 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0029 52.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-55602 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Dlink Dir-619L Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 47.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-120

Platform-independent managed code eliminates the need for unchecked native buffer copies that are the root cause of classic buffer overflows.

addresses: CWE-787

Out-of-bounds writes that corrupt control flow or inject shellcode are rendered non-executable by the same memory protections.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Buffer overflow vulnerability in the web management interface (formSysCmd via submit-url parameter) of D-Link DIR-619L router enables exploitation of a public-facing application for potential remote code execution.

NVD Description

D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formSysCmd function via the submit-url parameter.

Deeper analysisAI

CVE-2025-55602 is a buffer overflow vulnerability affecting the D-Link DIR-619L router on firmware version 2.06B01. The issue resides in the formSysCmd function and can be triggered via a specially crafted submit-url parameter. It is classified under CWE-787 (Out-of-bounds Write) and CWE-120 (Buffer Copy without Checking Size of Input), with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high availability impact potential without confidentiality or integrity effects.

An unauthenticated remote attacker with network access to the device can exploit this vulnerability with low attack complexity and no user interaction. By sending a malicious request to the vulnerable parameter, the attacker can trigger the buffer overflow, leading to denial-of-service conditions such as device crashes or reboots.

Mitigation guidance is available in vendor advisories, including the D-Link security bulletin at https://www.dlink.com/en/security-bulletin/. Additional technical details and analysis are provided in the referenced GitHub repository at https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_79/79.md.

Details

CWE(s)

Affected Products

dlink
dir-619l firmware
2.06b01

CVEs Like This One

CVE-2025-55599Same product: Dlink Dir-619L
CVE-2025-55611Same product: Dlink Dir-619L
CVE-2025-8978Same product: Dlink Dir-619L
CVE-2026-2055Same product: Dlink Dir-619L
CVE-2026-2054Same product: Dlink Dir-619L
CVE-2025-10792Same vendor: Dlink
CVE-2025-50670Same vendor: Dlink
CVE-2025-46108Same vendor: Dlink
CVE-2025-60554Same vendor: Dlink
CVE-2025-52222Same vendor: Dlink

References