CVE-2025-13191

A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta. This issue affects the function soapcgi_main of the file /soap.cgi. This manipulation causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/scanleale/IOT_sec/blob/main/DIR-816L%20stack%20overflow(soap.cgi).pdf Exploit Third Party Advisory
https://vuldb.com/?ctiid.332480 Permissions Required VDB Entry
https://vuldb.com/?id.332480 Third Party Advisory VDB Entry
https://vuldb.com/?submit.685543 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-816l_firmware:2.06.b09:beta:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-816l:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-11-15 07:15

Updated : 2025-11-19 18:04


NVD link : CVE-2025-13191

Mitre link : CVE-2025-13191

CVE.ORG link : CVE-2025-13191


JSON object : View

Products Affected

dlink

  • dir-816l
  • dir-816l_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow