Логотип exploitDog
bind:CVE-2025-6115
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-6115

Количество 3

Количество 3

nvd логотип

CVE-2025-6115

8 месяцев назад

A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by this issue is the function form_macfilter. The manipulation of the argument mac_hostname_%d/sched_name_%d leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-rj7h-x7mm-f8hv

8 месяцев назад

A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by this issue is the function form_macfilter. The manipulation of the argument mac_hostname_%d/sched_name_%d leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-09538

8 месяцев назад

Уязвимость функции form_macfilter микропрограммного обеспечения маршрутизатора D-Link DIR-619L, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-6115

A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by this issue is the function form_macfilter. The manipulation of the argument mac_hostname_%d/sched_name_%d leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 8.8
0%
Низкий
8 месяцев назад
github логотип
GHSA-rj7h-x7mm-f8hv

A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by this issue is the function form_macfilter. The manipulation of the argument mac_hostname_%d/sched_name_%d leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 8.8
0%
Низкий
8 месяцев назад
fstec логотип
BDU:2025-09538

Уязвимость функции form_macfilter микропрограммного обеспечения маршрутизатора D-Link DIR-619L, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
8 месяцев назад

Уязвимостей на страницу