D-Link Dir-632 vulnerabilities
3 known vulnerabilities affecting d-link/dir-632.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH3
Vulnerabilities
Page 1 of 1
CVE-2025-6121HIGHCVSS 8.9vFW103B082025-06-16
CVE-2025-6121 [HIGH] CWE-119 CVE-2025-6121: A vulnerability, which was classified as critical, has been found in D-Link DIR-632 FW103B08. Affect
A vulnerability, which was classified as critical, has been found in D-Link DIR-632 FW103B08. Affected by this issue is the function get_pure_content of the component HTTP POST Request Handler. The manipulation of the argument Content-Length leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the
cvelistv5nvd
CVE-2025-5969HIGHCVSS 7.4vFW103B082025-06-10
CVE-2025-5969 [HIGH] CWE-119 CVE-2025-5969: A vulnerability has been found in D-Link DIR-632 FW103B08 and classified as critical. Affected by th
A vulnerability has been found in D-Link DIR-632 FW103B08 and classified as critical. Affected by this vulnerability is the function FUN_00425fd8 of the file /biurl_grou of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and
cvelistv5nvd
CVE-2025-5912HIGHCVSS 7.4vFW103B082025-06-10
CVE-2025-5912 [HIGH] CWE-119 CVE-2025-5912: A vulnerability was found in D-Link DIR-632 FW103B08. It has been declared as critical. This vulnera
A vulnerability was found in D-Link DIR-632 FW103B08. It has been declared as critical. This vulnerability affects the function do_file of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability o
cvelistv5nvd