Metrics
Affected Vendors & Products
Tue, 17 Jun 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dlink
Dlink dir-632 Dlink dir-632 Firmware |
|
CPEs | cpe:2.3:h:dlink:dir-632:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-632_firmware:103b08:*:*:*:*:*:*:* |
|
Vendors & Products |
Dlink
Dlink dir-632 Dlink dir-632 Firmware |
Mon, 16 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 16 Jun 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as critical, has been found in D-Link DIR-632 FW103B08. Affected by this issue is the function get_pure_content of the component HTTP POST Request Handler. The manipulation of the argument Content-Length leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | |
Title | D-Link DIR-632 HTTP POST Request get_pure_content stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-06-16T12:00:12.435Z
Updated: 2025-06-16T13:58:25.466Z
Reserved: 2025-06-15T10:22:59.340Z
Link: CVE-2025-6121

Updated: 2025-06-16T13:58:09.725Z

Status : Analyzed
Published: 2025-06-16T12:15:19.970
Modified: 2025-06-17T19:37:29.160
Link: CVE-2025-6121

No data.