A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta. This issue affects the function soapcgi_main of the file /soap.cgi. This manipulation causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
References
| Link | Resource |
|---|---|
| https://github.com/scanleale/IOT_sec/blob/main/DIR-816L%20stack%20overflow(soap.cgi).pdf | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.332480 | Permissions Required VDB Entry |
| https://vuldb.com/?id.332480 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.685543 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-15 07:15
Updated : 2025-11-19 18:04
NVD link : CVE-2025-13191
Mitre link : CVE-2025-13191
CVE.ORG link : CVE-2025-13191
JSON object : View
Products Affected
dlink
- dir-816l
- dir-816l_firmware
