Severity
7.4HIGH
EPSS
0.7%
top 27.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 25
Latest updateAug 1

Description

A vulnerability was found in D-Link DIR-513 1.10. It has been rated as critical. Affected by this issue is the function websAspInit of the file /goform/formSetWanPPPoE. The manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5d-link/dir-5131.10

🔴Vulnerability Details

2
GHSA
GHSA-gp8p-9xfx-q8f8: A vulnerability was found in D-Link DIR-513 12025-07-25
CVEList
D-Link DIR-513 formSetWanPPPoE websAspInit buffer overflow2025-07-25

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS D-Link formSetWAN Multiple Endpoints curTime Parameter Buffer Overflow Attempt (CVE-2025-8184, CVE-2025-8169, CVE,2025-8168)2025-08-01

📋Vendor Advisories

1
Red Hat
kernel: perf/core: Add RCU read lock protection to perf_iterate_ctx()2025-03-27