CVE-2025-36564 – Dell Encryption Admin Utilities Vulnerability
June 5, 2025ViperSoftX Evolves: New PowerShell Malware – Active IOCs
June 5, 2025CVE-2025-36564 – Dell Encryption Admin Utilities Vulnerability
June 5, 2025ViperSoftX Evolves: New PowerShell Malware – Active IOCs
June 5, 2025Severity
High
Analysis Summary
CVE-2025-5630 CVSS:9.8
A vulnerability has been found in the D-Link DIR-816 and classified as critical. This vulnerability affects unknown code of the file /goform/form2lansetup.cgi. The manipulation of the argument ip leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-5624 CVSS:10
A vulnerability was found in D-Link DIR-816. It has been declared as critical. This vulnerability affects the function QoSPortSetup of the file /goform/QoSPortSetup. The manipulation of the argument port0_group/port0_remarker/ssid0_group/ssid0_remarker leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-5620 CVSS:7.5
A vulnerability, which was classified as critical, was found in D-Link DIR-816. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-5621 CVSS:7.5
A vulnerability has been found in D-Link DIR-816 and classified as critical. Affected by this vulnerability is the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-5622 CVSS:10
A vulnerability was found in D-Link DIR-816 and classified as critical. Affected by this issue is the function wirelessApcli_5g of the file /goform/wirelessApcli_5g. The manipulation of the argument apcli_mode_5g/apcli_enc_5g/apcli_default_key_5g leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-5623 CVSS:10
A vulnerability was found in D-Link DIR-816. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Impact
- Buffer Overflow
Indicators of Compromise
CVE
CVE-2025-5630
CVE-2025-5624
CVE-2025-5623
CVE-2025-5620
CVE-2025-5621
CVE-2025-5622
Affected Vendors
- D-Link
Affected Products
- D-Link DIR-816 - 1.10CNB05
Remediation
Refer to the D-Link Website for patch, upgrade, or suggested workaround information.