Severity
8.9HIGH
EPSS
0.3%
top 44.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 14
Latest updateNov 17

Description

A vulnerability was detected in D-Link DIR-816L 2_06_b09_beta. Affected by this vulnerability is the function authenticationcgi_main of the file /authentication.cgi. Performing manipulation of the argument Password results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5d-link/dir-816l2_06_b09_beta

🔴Vulnerability Details

2
GHSA
GHSA-5788-x3vg-5gpv: A vulnerability was detected in D-Link DIR-816L 2_06_b09_beta2025-11-15
CVEList
D-Link DIR-816L authentication.cgi authenticationcgi_main stack-based overflow2025-11-14

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS D-Link authentication.cgi password Parameter Buffer Overflow Attempt (CVE-2025-13188)2025-11-17
CVE-2025-13188 (HIGH CVSS 8.9) | A vulnerability was detected in D-L | cvebase.io