Dlink Dir-619L Firmware vulnerabilities

65 known vulnerabilities affecting dlink/dir-619l_firmware.

Total CVEs
65
CISA KEV
1
actively exploited
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL5HIGH49MEDIUM11

Vulnerabilities

Page 1 of 4
CVE-2026-2055MEDIUMCVSS 5.5v2.13b012026-02-06
CVE-2026-2055 [MEDIUM] CWE-200 CVE-2026-2055: A weakness has been identified in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The affected element A weakness has been identified in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The affected element is an unknown function of the component DHCP Client Information Handler. Executing a manipulation can lead to information disclosure. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
nvd
CVE-2026-2056MEDIUMCVSS 5.5v2.13b012026-02-06
CVE-2026-2056 [MEDIUM] CWE-200 CVE-2026-2056: A security vulnerability has been detected in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The impa A security vulnerability has been detected in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The impacted element is an unknown function of the file /wan_connection_status.asp of the component DHCP Connection Status Handler. The manipulation leads to information disclosure. Remote exploitation of the attack is possible. The exploit has been disclosed p
nvd
CVE-2026-2054MEDIUMCVSS 5.5v2.13b012026-02-06
CVE-2026-2054 [MEDIUM] CWE-200 CVE-2026-2054: A security flaw has been discovered in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. Impacted is an A security flaw has been discovered in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. Impacted is an unknown function of the component Wifi Setting Handler. Performing a manipulation results in information disclosure. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only af
nvd
CVE-2025-55611HIGHCVSS 7.5v2.06b012025-08-22
CVE-2025-55611 [HIGH] CWE-787 CVE-2025-55611: D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formLanguageChange function via the D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formLanguageChange function via the nextPage parameter.
nvd
CVE-2025-55602HIGHCVSS 7.5v2.06b012025-08-22
CVE-2025-55602 [HIGH] CWE-787 CVE-2025-55602: D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formSysCmd function via the submit-u D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formSysCmd function via the submit-url parameter.
nvd
CVE-2025-55599HIGHCVSS 7.5v2.06b012025-08-22
CVE-2025-55599 [HIGH] CWE-787 CVE-2025-55599: D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formWlanSetup function via the param D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formWlanSetup function via the parameter f_wds_wepKey.
nvd
CVE-2025-8978MEDIUMCVSS 6.6v6.02cn022025-08-14
CVE-2025-8978 [MEDIUM] CWE-345 CVE-2025-8978: A vulnerability was determined in D-Link DIR-619L 6.02CN02. Affected is the function FirmwareUpgrade A vulnerability was determined in D-Link DIR-619L 6.02CN02. Affected is the function FirmwareUpgrade of the component boa. The manipulation leads to insufficient verification of data authenticity. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been d
nvd
CVE-2025-6617HIGHCVSS 7.4v2.06b12025-06-25
CVE-2025-6617 [HIGH] CWE-119 CVE-2025-6617: A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. This issue affects A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. This issue affects the function formAdvanceSetup of the file /goform/formAdvanceSetup. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vuln
nvd
CVE-2025-6616HIGHCVSS 7.4v2.06b12025-06-25
CVE-2025-6616 [HIGH] CWE-119 CVE-2025-6616: A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as critical. This vulnerabi A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as critical. This vulnerability affects the function formSetWAN_Wizard51 of the file /goform/formSetWAN_Wizard51. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and ma
nvd
CVE-2025-6614HIGHCVSS 7.4v2.06b12025-06-25
CVE-2025-6614 [HIGH] CWE-119 CVE-2025-6614: A vulnerability, which was classified as critical, has been found in D-Link DIR-619L 2.06B01. Affect A vulnerability, which was classified as critical, has been found in D-Link DIR-619L 2.06B01. Affected by this issue is the function formSetWANType_Wizard5 of the file /goform/formSetWANType_Wizard5. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the p
nvd
CVE-2025-6615HIGHCVSS 7.4v2.06b12025-06-25
CVE-2025-6615 [HIGH] CWE-119 CVE-2025-6615: A vulnerability, which was classified as critical, was found in D-Link DIR-619L 2.06B01. This affect A vulnerability, which was classified as critical, was found in D-Link DIR-619L 2.06B01. This affects the function formAutoDetecWAN_wizard4 of the file /goform/formAutoDetecWAN_wizard4. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the publ
nvd
CVE-2025-6374HIGHCVSS 7.4v2.06b12025-06-21
CVE-2025-6374 [HIGH] CWE-119 CVE-2025-6374: A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. This issue affects A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. This issue affects the function formSetACLFilter of the file /goform/formSetACLFilter. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vuln
nvd
CVE-2025-6373HIGHCVSS 7.4v2.06b12025-06-21
CVE-2025-6373 [HIGH] CWE-119 CVE-2025-6373: A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as critical. This vulnerabi A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as critical. This vulnerability affects the function formSetWizard1 of the file /goform/formWlSiteSurvey. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be use
nvd
CVE-2025-6369HIGHCVSS 7.4v2.06b12025-06-20
CVE-2025-6369 [HIGH] CWE-119 CVE-2025-6369: A vulnerability classified as critical has been found in D-Link DIR-619L 2.06B01. Affected is the fu A vulnerability classified as critical has been found in D-Link DIR-619L 2.06B01. Affected is the function formdumpeasysetup of the file /goform/formdumpeasysetup. The manipulation of the argument curTime/config.save_network_enabled leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the
nvd
CVE-2025-6371HIGHCVSS 7.4v2.06b12025-06-20
CVE-2025-6371 [HIGH] CWE-119 CVE-2025-6371: A vulnerability, which was classified as critical, has been found in D-Link DIR-619L 2.06B01. Affect A vulnerability, which was classified as critical, has been found in D-Link DIR-619L 2.06B01. Affected by this issue is the function formSetEnableWizard of the file /goform/formSetEnableWizard. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public
nvd
CVE-2025-6370HIGHCVSS 7.4v2.06b12025-06-20
CVE-2025-6370 [HIGH] CWE-119 CVE-2025-6370: A vulnerability classified as critical was found in D-Link DIR-619L 2.06B01. Affected by this vulner A vulnerability classified as critical was found in D-Link DIR-619L 2.06B01. Affected by this vulnerability is the function formWlanGuestSetup of the file /goform/formWlanGuestSetup. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be
nvd
CVE-2025-6368HIGHCVSS 7.4v2.06b12025-06-20
CVE-2025-6368 [HIGH] CWE-119 CVE-2025-6368: A vulnerability was found in D-Link DIR-619L 2.06B01. It has been rated as critical. This issue affe A vulnerability was found in D-Link DIR-619L 2.06B01. It has been rated as critical. This issue affects the function formSetEmail of the file /goform/formSetEmail. The manipulation of the argument curTime/config.smtp_email_subject leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and
nvd
CVE-2025-6367HIGHCVSS 7.4v2.06b012025-06-20
CVE-2025-6367 [HIGH] CWE-119 CVE-2025-6367: A vulnerability was found in D-Link DIR-619L 2.06B01. It has been declared as critical. This vulnera A vulnerability was found in D-Link DIR-619L 2.06B01. It has been declared as critical. This vulnerability affects unknown code of the file /goform/formSetDomainFilter. The manipulation of the argument curTime/sched_name_%d/url_%d leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and
nvd
CVE-2025-6372HIGHCVSS 7.4v2.06b12025-06-20
CVE-2025-6372 [HIGH] CWE-119 CVE-2025-6372: A vulnerability, which was classified as critical, was found in D-Link DIR-619L 2.06B01. This affect A vulnerability, which was classified as critical, was found in D-Link DIR-619L 2.06B01. This affects the function formSetWizard1 of the file /goform/formSetWizard1. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
nvd
CVE-2025-6114HIGHCVSS 7.4v2.06b012025-06-16
CVE-2025-6114 [HIGH] CWE-119 CVE-2025-6114: A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by th A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by this vulnerability is the function form_portforwarding of the file /goform/form_portforwarding. The manipulation of the argument ingress_name_%d/sched_name_%d/name_%d leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has
nvd