A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta. This issue affects the function soapcgi_main of the file /soap.cgi. This manipulation causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 19 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-816l
Dlink dir-816l Firmware
CPEs cpe:2.3:h:dlink:dir-816l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-816l_firmware:2.06.b09:beta:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-816l
Dlink dir-816l Firmware

Mon, 17 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 15 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-816l
Vendors & Products D-link
D-link dir-816l

Sat, 15 Nov 2025 07:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta. This issue affects the function soapcgi_main of the file /soap.cgi. This manipulation causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-816L soap.cgi soapcgi_main stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-11-17T15:00:24.513Z

Reserved: 2025-11-14T13:14:06.277Z

Link: CVE-2025-13191

cve-icon Vulnrichment

Updated: 2025-11-17T15:00:06.351Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-15T07:15:46.627

Modified: 2025-11-19T18:04:24.997

Link: CVE-2025-13191

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-15T21:25:18Z

Weaknesses