Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10666: Buffer Overflow in D-Link DIR-825

0
High
VulnerabilityCVE-2025-10666cvecve-2025-10666
Published: Thu Sep 18 2025 (09/18/2025, 13:02:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-825

Description

A security flaw has been discovered in D-Link DIR-825 up to 2.10. Affected by this vulnerability is the function sub_4106d4 of the file apply.cgi. The manipulation of the argument countdown_time results in buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:23:38 UTC

Technical Analysis

CVE-2025-10666 is a buffer overflow vulnerability discovered in the D-Link DIR-825 router series, affecting firmware versions from 2.0 through 2.10. The vulnerability resides in the apply.cgi script, specifically within the sub_4106d4 function, where the countdown_time parameter is improperly validated, allowing an attacker to supply a crafted input that overflows a buffer. This overflow can corrupt memory, potentially enabling remote code execution or denial of service. The attack vector is network-based, requiring no authentication or user interaction, making it highly accessible to remote attackers. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity with high impact on confidentiality, integrity, and availability. Notably, the affected devices are no longer supported by D-Link, and no official patches have been released. Public exploit code is available, increasing the likelihood of exploitation. The vulnerability's exploitation could allow attackers to take full control of the router, intercept or manipulate network traffic, or disrupt network services. Given the router's role as a gateway device, compromise could have cascading effects on connected networks and devices.

Potential Impact

For European organizations, the impact of CVE-2025-10666 can be significant. The DIR-825 router is commonly used in small to medium-sized enterprises and some home office environments across Europe. A successful exploit could lead to full device compromise, enabling attackers to intercept sensitive communications, inject malicious traffic, or disrupt network availability. This is particularly critical for organizations that rely on these routers for VPN access or as primary internet gateways. The lack of vendor support and patches means vulnerable devices remain exposed, increasing the risk of targeted attacks or opportunistic exploitation. Additionally, compromised routers could be leveraged as footholds for lateral movement within corporate networks or as part of botnets for broader attacks. The threat is exacerbated in sectors with stringent data protection requirements, such as finance, healthcare, and government, where confidentiality and availability are paramount.

Mitigation Recommendations

Given the absence of official patches, the most effective mitigation is to replace all affected D-Link DIR-825 devices with newer, supported hardware that receives regular security updates. If immediate replacement is not feasible, organizations should isolate vulnerable routers from critical network segments using VLANs or firewalls to limit exposure. Disabling remote management interfaces and restricting administrative access to trusted IP addresses can reduce attack surface. Network monitoring should be enhanced to detect anomalous traffic patterns indicative of exploitation attempts. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for known exploits targeting this vulnerability can provide additional defense. Regularly auditing network devices for outdated firmware and maintaining an inventory of hardware assets will help identify and remediate vulnerable equipment proactively. Finally, educating IT staff about the risks of unsupported devices and the importance of timely upgrades is crucial.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-18T05:28:19.832Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cc0508030f00d77e45da01

Added to database: 9/18/2025, 1:11:36 PM

Last enriched: 2/4/2026, 8:23:38 AM

Last updated: 2/7/2026, 6:32:26 AM

Views: 148

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats