Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-8169

Опубликовано: 25 июл. 2025
Источник: nvd
CVSS3: 8.8
CVSS3: 9.8
CVSS2: 9
EPSS Низкий

Описание

A vulnerability classified as critical has been found in D-Link DIR-513 1.10. This affects the function formSetWanPPTPcallback of the file /goform/formSetWanPPTPpath of the component HTTP POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:dlink:dir-513_firmware:1.10:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:dlink:dir-513:a1:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-513:a2:*:*:*:*:*:*:*

EPSS

Процентиль: 15%
0.00049
Низкий

8.8 High

CVSS3

9.8 Critical

CVSS3

9 Critical

CVSS2

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 8.8
github
около 2 месяцев назад

A vulnerability classified as critical has been found in D-Link DIR-513 1.10. This affects the function formSetWanPPTPcallback of the file /goform/formSetWanPPTPpath of the component HTTP POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 7.3
fstec
около 2 месяцев назад

Уязвимость функции formSetWanPPTPcallback() компонента HTTP POST Request Handler микропрограммного обеспечения маршрутизаторов D-Link DIR-513, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 15%
0.00049
Низкий

8.8 High

CVSS3

9.8 Critical

CVSS3

9 Critical

CVSS2

Дефекты

CWE-119
CWE-787