A vulnerability was found in D-Link DIR-600 up to 2.15WWb02. Affected by this vulnerability is an unknown functionality of the file hedwig.cgi of the component HTTP Header Handler. The manipulation of the argument Cookie results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
| Link | Resource |
|---|---|
| https://github.com/LonTan0/CVE/blob/main/Stack-Based%20Buffer%20Overflow%20Vulnerability%20in%20hedwig.cgi%20of%20D-Link%20DIR-600.md | Exploit Third Party Advisory |
| https://github.com/LonTan0/CVE/blob/main/Stack-Based%20Buffer%20Overflow%20Vulnerability%20in%20hedwig.cgi%20of%20D-Link%20DIR-600.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.338581 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338581 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.724404 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-29 16:15
Updated : 2026-01-13 21:11
NVD link : CVE-2025-15194
Mitre link : CVE-2025-15194
CVE.ORG link : CVE-2025-15194
JSON object : View
Products Affected
dlink
- dir-600
- dir-600_firmware
