Severity
7.4HIGHNVD
EPSS
0.8%
top 25.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 20

Description

A vulnerability, which was classified as critical, was found in D-Link DIR-825 2.03. This affects the function do_file of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5d-link/dir-8252.03

🔴Vulnerability Details

2
CVEList
D-Link DIR-825 HTTP POST Request do_file stack-based overflow2025-06-20
GHSA
GHSA-84hr-pmrh-gc2g: A vulnerability, which was classified as critical, was found in D-Link DIR-825 22025-06-20

📋Vendor Advisories

1
Microsoft
In Netwide Assembler (NASM) 2.14.02, stack consumption occurs in expr# functions in asm/eval.c. This potentially affects the relationships among expr0, expr1, expr2, expr3, expr4, expr5, and expr6 (an2020-01-14
CVE-2025-6291 — D-link Dir-825 vulnerability | cvebase