CVE-2025-55602
Published: 22 August 2025
Summary
CVE-2025-55602 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Dlink Dir-619L Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 47.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Platform-independent managed code eliminates the need for unchecked native buffer copies that are the root cause of classic buffer overflows.
Out-of-bounds writes that corrupt control flow or inject shellcode are rendered non-executable by the same memory protections.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow vulnerability in the web management interface (formSysCmd via submit-url parameter) of D-Link DIR-619L router enables exploitation of a public-facing application for potential remote code execution.
NVD Description
D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formSysCmd function via the submit-url parameter.
Deeper analysisAI
CVE-2025-55602 is a buffer overflow vulnerability affecting the D-Link DIR-619L router on firmware version 2.06B01. The issue resides in the formSysCmd function and can be triggered via a specially crafted submit-url parameter. It is classified under CWE-787 (Out-of-bounds Write) and CWE-120 (Buffer Copy without Checking Size of Input), with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high availability impact potential without confidentiality or integrity effects.
An unauthenticated remote attacker with network access to the device can exploit this vulnerability with low attack complexity and no user interaction. By sending a malicious request to the vulnerable parameter, the attacker can trigger the buffer overflow, leading to denial-of-service conditions such as device crashes or reboots.
Mitigation guidance is available in vendor advisories, including the D-Link security bulletin at https://www.dlink.com/en/security-bulletin/. Additional technical details and analysis are provided in the referenced GitHub repository at https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_79/79.md.
Details
- CWE(s)