A vulnerability was found in D-Link DIR-619L 2.06B01. It has been rated as critical. This issue affects the function formSetEmail of the file /goform/formSetEmail. The manipulation of the argument curTime/config.smtp_email_subject leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Jun 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in D-Link DIR-619L 2.06B01. It has been rated as critical. This issue affects the function formSetEmail of the file /goform/formSetEmail. The manipulation of the argument curTime/config.smtp_email_subject leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | |
Title | D-Link DIR-619L formSetEmail stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-06-20T21:31:05.469Z
Updated: 2025-06-20T21:31:05.469Z
Reserved: 2025-06-19T13:44:42.561Z
Link: CVE-2025-6368

No data.

Status : Received
Published: 2025-06-20T22:15:19.407
Modified: 2025-06-20T22:15:19.407
Link: CVE-2025-6368

No data.