A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
History

Wed, 26 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dap-1620
Dlink dap-1620 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:dlink:dap-1620:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dap-1620_firmware:1.03:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dap-1620
Dlink dap-1620 Firmware

Mon, 24 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 22 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Title D-Link DAP-1620 Cookie storage check_dws_cookie stack-based overflow
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Sat, 22 Mar 2025 14:45:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 10.0, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-03-24T17:32:29.501Z

Reserved: 2025-03-21T20:28:47.545Z

Link: CVE-2025-2619

cve-icon Vulnrichment

Updated: 2025-03-24T17:32:16.692Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-22T14:15:16.867

Modified: 2025-03-26T18:46:06.633

Link: CVE-2025-2619

cve-icon Redhat

No data.