ID

VAR-202503-2611


CVE

CVE-2025-2551


TITLE

D-Link Systems, Inc.  of  DIR-618  firmware and  DIR-605L  Vulnerability regarding improper permission settings in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-009494

DESCRIPTION

A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been classified as problematic. This affects an unknown part of the file /goform/formSetPortTr. The manipulation leads to improper access controls. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Systems, Inc. of DIR-618 firmware and DIR-605L The firmware contains vulnerabilities related to improper permission settings and access control.Information may be tampered with. D-Link DIR-605L and D-Link DIR-618 are both wireless routers from China's D-Link. D-Link DIR-618 version 2.02 and D-Link DIR-605L version 3.02 have access control error vulnerabilities. Attackers can use this vulnerability to set port rules for the device

Trust: 2.16

sources: NVD: CVE-2025-2551 // JVNDB: JVNDB-2025-009494 // CNVD: CNVD-2025-11324

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-11324

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-605lscope:eqversion:3.02

Trust: 1.0

vendor:dlinkmodel:dir-618scope:eqversion:2.02

Trust: 1.0

vendor:d linkmodel:dir-618scope: - version: -

Trust: 0.8

vendor:d linkmodel:dir-605lscope: - version: -

Trust: 0.8

vendor:d linkmodel:dir-618scope:eqversion:2.02

Trust: 0.6

vendor:d linkmodel:dir-605lscope:eqversion:3.02

Trust: 0.6

sources: CNVD: CNVD-2025-11324 // JVNDB: JVNDB-2025-009494 // NVD: CVE-2025-2551

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-2551
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-009494
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-11324
value: LOW

Trust: 0.6

cna@vuldb.com: CVE-2025-2551
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-009494
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:P/A:N
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-11324
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-2551
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-009494
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-11324 // JVNDB: JVNDB-2025-009494 // NVD: CVE-2025-2551

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.0

problemtype:CWE-266

Trust: 1.0

problemtype:Improper permission settings (CWE-266) [ others ]

Trust: 0.8

problemtype: Inappropriate access control (CWE-284) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-009494 // NVD: CVE-2025-2551

EXTERNAL IDS

db:NVDid:CVE-2025-2551

Trust: 3.2

db:VULDBid:300165

Trust: 1.8

db:JVNDBid:JVNDB-2025-009494

Trust: 0.8

db:CNVDid:CNVD-2025-11324

Trust: 0.6

sources: CNVD: CNVD-2025-11324 // JVNDB: JVNDB-2025-009494 // NVD: CVE-2025-2551

REFERENCES

url:https://lavender-bicycle-a5a.notion.site/d-link-dir-605l-formsetporttr-1b153a41781f809d95c8e39c6c31c348?pvs=4

Trust: 2.4

url:https://lavender-bicycle-a5a.notion.site/d-link-dir-618-formsetporttr-1b053a41781f8000a9ded17aa2f587cc?pvs=4

Trust: 1.8

url:https://vuldb.com/?id.300165

Trust: 1.8

url:https://vuldb.com/?submit.516793

Trust: 1.8

url:https://www.dlink.com/

Trust: 1.8

url:https://vuldb.com/?ctiid.300165

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-2551

Trust: 0.8

sources: CNVD: CNVD-2025-11324 // JVNDB: JVNDB-2025-009494 // NVD: CVE-2025-2551

SOURCES

db:CNVDid:CNVD-2025-11324
db:JVNDBid:JVNDB-2025-009494
db:NVDid:CVE-2025-2551

LAST UPDATE DATE

2025-07-26T23:06:13.539000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-11324date:2025-06-04T00:00:00
db:JVNDBid:JVNDB-2025-009494date:2025-07-22T07:24:00
db:NVDid:CVE-2025-2551date:2025-07-14T18:14:40.997

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-11324date:2025-06-04T00:00:00
db:JVNDBid:JVNDB-2025-009494date:2025-07-22T00:00:00
db:NVDid:CVE-2025-2551date:2025-03-20T17:15:39.090