Multiple critical vulnerabilities in D-Link router models could allow remote attackers to execute arbitrary code and gain unauthorized access to the network infrastructure. These vulnerabilities fall under CWE-121 (Stack-based Buffer Overflow) and CWE-119 (Memory Corruption) categories, enabling attackers to overwrite memory segments and potentially execute malicious code with administrative privileges. These command injection flaws, categorized under CWE-78 (OS Command Injection) and CWE-77 (Command Injection), carry CVSS scores of 7.3 and enable attackers to execute unauthorized operating system commands remotely. The vulnerabilities were initially disclosed by security researcher pjqwudi through VULdb Disclosure, highlighting the critical nature of these network infrastructure security flaws. Six critical vulnerabilities in D-Link DIR-816 routers allow remote code execution (CVSS 9.8) 2. No security patches available - all DIR-816 models are End-of-Life with permanent vulnerabilities. The vulnerabilities affect all hardware revisions and firmware versions of the non-US DIR-816 models, which have now reached their End-of-Life (EOL) status. Kaaviya is a Security Editor and fellow reporter with Cyber Security News. These flaws include CVE-2025-5622 affecting the wirelessApcli_5g function in /goform/wirelessApcli_5g, where manipulation of parameters apcli_mode_5g, apcli_enc_5g, and apcli_default_key_5g leads to memory corruption. Users are advised to transition to current-generation products with active firmware development, perform comprehensive data backups, and contact D-Link regional offices for replacement recommendations.
This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 30 Jun 2025 15:35:18 +0000