Critical Severity Vulnerability
This vulnerability has been rated as Critical severity. Immediate action is recommended.
CVE-2025-15194
CriticalVulnerability Description
A vulnerability was found in D-Link DIR-600 up to 2.15WWb02. Affected by this vulnerability is an unknown functionality of the file hedwig.cgi of the component HTTP Header Handler. The manipulation of the argument Cookie results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
1 configuration(s) from 1 vendor(s)
cpe:2.3:o:dlink:dir-600_firmware:2.15ww:*:*:*:*:*:*:*
References & Resources
-
https://github.com/LonTan0/CVE/blob/main/Stack-Based%20Buffer%20Overflow%20Vulnerability%20in%20hedwig.cgi%20of%20D-Link%20DIR-600.mdcna@vuldb.com Exploit Third Party Advisory
-
https://github.com/LonTan0/CVE/blob/main/Stack-Based%20Buffer%20Overflow%20Vulnerability%20in%20hedwig.cgi%20of%20D-Link%20DIR-600.md#poccna@vuldb.com Exploit Third Party Advisory
-
https://vuldb.com/?ctiid.338581cna@vuldb.com Permissions Required VDB Entry
-
https://vuldb.com/?id.338581cna@vuldb.com Third Party Advisory VDB Entry
-
https://vuldb.com/?submit.724404cna@vuldb.com Third Party Advisory VDB Entry
-
https://www.dlink.com/cna@vuldb.com Product
Severity Details
Key Information
- Published Date
- December 29, 2025
