DIR-816L: Stack-based Buffer Overflow via Password Argument
CVE-2025-13188 Published on November 14, 2025

D-Link DIR-816L authentication.cgi authenticationcgi_main stack-based overflow
A vulnerability was detected in D-Link DIR-816L 2_06_b09_beta. Affected by this vulnerability is the function authenticationcgi_main of the file /authentication.cgi. Performing manipulation of the argument Password results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

NVD

Timeline

Advisory disclosed

VulDB entry created

VulDB entry last update

Weakness Types

What is a Stack Overflow Vulnerability?

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).

CVE-2025-13188 has been classified to as a Stack Overflow vulnerability or weakness.

What is a Buffer Overflow Vulnerability?

The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

CVE-2025-13188 has been classified to as a Buffer Overflow vulnerability or weakness.


Products Associated with CVE-2025-13188

Want to know whenever a new CVE is published for D-Link Dir 816l? stack.watch will email you.

 

Affected Versions

D-Link DIR-816L Version 2_06_b09_beta is affected by CVE-2025-13188

Exploit Probability

EPSS
0.33%
Percentile
55.81%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.