Severity
5.3MEDIUM
EPSS
0.6%
top 31.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 20
Latest updateApr 16

Description

A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02 and classified as problematic. Affected by this issue is some unknown functionality of the file /goform/formSetDDNS of the component DDNS Service. The manipulation leads to improper access controls. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages4 packages

CVEListV5d-link/dir-605l2.02, 3.02+1
CVEListV5d-link/dir-6182.02, 3.02+1

🔴Vulnerability Details

2
CVEList
D-Link DIR-618/DIR-605L DDNS Service formSetDDNS access control2025-03-20
GHSA
GHSA-jjx5-r5w6-73ph: A vulnerability was found in D-Link DIR-618 and DIR-605L 22025-03-20

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS D-Link DIR-605L/DIR-618 Multiple Authentication Bypass URI Endpoints (CVE-2025-2546 - CVE-2025-2553)2025-04-16