CVE-2025-8978
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-14

Last updated on: 2025-09-12

Assigner: VulDB

Description
A vulnerability was determined in D-Link DIR-619L 6.02CN02. Affected is the function FirmwareUpgrade of the component boa. The manipulation leads to insufficient verification of data authenticity. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-14
Last Modified
2025-09-12
Generated
2026-05-07
AI Q&A
2025-08-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
dlink dir-619l_firmware 6.02cn02
dlink dir-619l *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the FirmwareUpgrade function of the boa component in the D-Link DIR-619L 6.02CN02 device. It involves insufficient verification of data authenticity during firmware upgrades, which means an attacker could potentially manipulate the firmware upgrade process. The attack can be launched remotely but is considered difficult to exploit and requires high complexity. The affected products are no longer supported by the maintainer.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow an attacker to compromise the integrity of the device's firmware by bypassing authenticity checks during firmware upgrades. This could lead to unauthorized code execution, potentially resulting in loss of confidentiality, integrity, and availability of the device. However, the attack complexity is high and exploitability is difficult.


What immediate steps should I take to mitigate this vulnerability?

Since the affected products (D-Link DIR-619L 6.02CN02) are no longer supported by the maintainer, immediate mitigation steps include isolating the vulnerable device from untrusted networks, disabling remote firmware upgrade functionality if possible, and monitoring network traffic for suspicious activity related to firmware upgrades. Consider replacing the device with a supported model to ensure ongoing security updates.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart