{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6292","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-06-19T07:32:41.955Z","datePublished":"2025-06-20T00:31:05.948Z","dateUpdated":"2025-06-23T19:29:05.747Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-06-20T00:31:05.948Z"},"title":"D-Link DIR-825 HTTP POST Request sub_4091AC stack-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-121","lang":"en","description":"Stack-based Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"D-Link","product":"DIR-825","versions":[{"version":"2.03","status":"affected"}],"modules":["HTTP POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in D-Link DIR-825 2.03 and classified as critical. This vulnerability affects the function sub_4091AC of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"de","value":"In D-Link DIR-825 2.03 wurde eine kritische Schwachstelle gefunden. Hierbei betrifft es die Funktion sub_4091AC der Komponente HTTP POST Request Handler. Durch die Manipulation mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-06-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-06-19T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-06-19T09:38:14.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"xiaobor123 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.313294","name":"VDB-313294 | D-Link DIR-825 HTTP POST Request sub_4091AC stack-based overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.313294","name":"VDB-313294 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.593938","name":"Submit #593938 | dlink DIR-825 REVB_FIRMWARE_2.03 Stack-based Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC","tags":["related"]},{"url":"https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC#poc","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"references":[{"url":"https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-23T16:15:31.391568Z","id":"CVE-2025-6292","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-23T19:29:05.747Z"}}]}}