Логотип exploitDog
bind:CVE-2025-2619
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-2619

Количество 3

Количество 3

nvd логотип

CVE-2025-2619

11 месяцев назад

A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2v55-9vh6-3j74

11 месяцев назад

A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2025-03188

11 месяцев назад

Уязвимость функции check_dws_cookie() микропрограммного обеспечения беспроводных повторителей D-Link DAP-1620, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-2619

A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 9.8
1%
Низкий
11 месяцев назад
github логотип
GHSA-2v55-9vh6-3j74

A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 9.8
1%
Низкий
11 месяцев назад
fstec логотип
BDU:2025-03188

Уязвимость функции check_dws_cookie() микропрограммного обеспечения беспроводных повторителей D-Link DAP-1620, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 9.8
1%
Низкий
11 месяцев назад

Уязвимостей на страницу