A vulnerability, which was classified as critical, has been found in D-Link DIR-632 FW103B08. Affected by this issue is the function get_pure_content of the component HTTP POST Request Handler. The manipulation of the argument Content-Length leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
History

Tue, 17 Jun 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-632
Dlink dir-632 Firmware
CPEs cpe:2.3:h:dlink:dir-632:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-632_firmware:103b08:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-632
Dlink dir-632 Firmware

Mon, 16 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Jun 2025 12:15:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, has been found in D-Link DIR-632 FW103B08. Affected by this issue is the function get_pure_content of the component HTTP POST Request Handler. The manipulation of the argument Content-Length leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-632 HTTP POST Request get_pure_content stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-06-16T12:00:12.435Z

Updated: 2025-06-16T13:58:25.466Z

Reserved: 2025-06-15T10:22:59.340Z

Link: CVE-2025-6121

cve-icon Vulnrichment

Updated: 2025-06-16T13:58:09.725Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-16T12:15:19.970

Modified: 2025-06-17T19:37:29.160

Link: CVE-2025-6121

cve-icon Redhat

No data.