Severity
7.4HIGH
EPSS
0.3%
top 47.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 26
Latest updateAug 1

Description

A vulnerability was found in D-Link DIR-513 up to 1.10 and classified as critical. This issue affects the function formSetWanL2TPcallback of the file /goform/formSetWanL2TPtriggers of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

NVDdlink/dir-513_firmware1.01.10
CVEListV5d-link/dir-51311 versions+10

🔴Vulnerability Details

2
GHSA
GHSA-gcvq-jr65-5cwf: A vulnerability was found in D-Link DIR-513 up to 12025-07-26
CVEList
D-Link DIR-513 HTTP POST Request formSetWanL2TPtriggers formSetWanL2TPcallback stack-based overflow2025-07-26

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS D-Link formSetWAN Multiple Endpoints curTime Parameter Buffer Overflow Attempt (CVE-2025-8184, CVE-2025-8169, CVE,2025-8168)2025-08-01

📋Vendor Advisories

1
Oracle
Oracle Oracle Fusion Middleware Risk Matrix: Security (Eclipse Jetty) — CVE-2024-81842025-07-15