Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13304: Buffer Overflow in D-Link DWR-M920

0
High
VulnerabilityCVE-2025-13304cvecve-2025-13304
Published: Mon Nov 17 2025 (11/17/2025, 22:32:07 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M920

Description

A security flaw has been discovered in D-Link DWR-M920, DWR-M921, DWR-M960, DWR-M961 and DIR-825M 1.01.07/1.1.47. This vulnerability affects unknown code of the file /boafrm/formPingDiagnosticRun. Performing manipulation of the argument host results in buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 11/24/2025, 23:15:58 UTC

Technical Analysis

CVE-2025-13304 is a buffer overflow vulnerability identified in multiple D-Link router models, specifically DWR-M920, DWR-M921, DWR-M960, DWR-M961, and DIR-825M running firmware versions 1.01.07 and 1.1.47. The vulnerability resides in the handling of the 'host' parameter within the /boafrm/formPingDiagnosticRun endpoint. By crafting a specially manipulated argument for 'host', an attacker can cause a buffer overflow condition remotely, without requiring any authentication or user interaction. This flaw stems from improper input validation and insufficient bounds checking in the affected code, allowing memory corruption. The consequence of this overflow can be arbitrary code execution with elevated privileges on the device, potentially enabling attackers to take full control of the router, disrupt network traffic, or pivot into internal networks. The vulnerability is remotely exploitable over the network, increasing its threat level. Although no active exploitation has been reported in the wild, the public release of exploit code raises the likelihood of imminent attacks. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low complexity, no authentication, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability affects a broad range of D-Link devices commonly deployed in enterprise and consumer environments, making it a significant risk for organizations relying on these routers for network connectivity and security.

Potential Impact

For European organizations, exploitation of CVE-2025-13304 could lead to severe consequences including unauthorized remote control of network routers, interception or manipulation of network traffic, and potential lateral movement within corporate networks. This could result in data breaches, disruption of business operations, and compromise of sensitive information. Critical infrastructure sectors such as finance, healthcare, and government agencies that rely on these D-Link devices for connectivity could face operational outages or espionage risks. The ability to execute arbitrary code remotely without authentication amplifies the threat, as attackers can deploy malware, establish persistent backdoors, or launch further attacks from compromised routers. The public availability of exploit code increases the urgency for European organizations to address this vulnerability promptly to prevent exploitation attempts that could impact confidentiality, integrity, and availability of their networks.

Mitigation Recommendations

1. Immediately restrict remote access to the management interfaces of affected D-Link devices by disabling WAN-side access or implementing strict firewall rules limiting access to trusted IP addresses. 2. Monitor network traffic for unusual activity, especially targeting the /boafrm/formPingDiagnosticRun endpoint or suspicious payloads containing malformed 'host' parameters. 3. Apply firmware updates or patches from D-Link as soon as they become available; if no official patch exists, consider temporary mitigations such as disabling vulnerable services or isolating affected devices on segmented network zones. 4. Conduct a thorough inventory of all D-Link devices in use to identify those running vulnerable firmware versions and prioritize their remediation. 5. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures targeting this specific exploit to detect and block exploitation attempts. 6. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling if exploitation is detected. 7. Consider replacing outdated or unsupported devices with newer models that receive regular security updates to reduce future risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-17T14:12:06.794Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691ba3aabb922d226272e02f

Added to database: 11/17/2025, 10:37:30 PM

Last enriched: 11/24/2025, 11:15:58 PM

Last updated: 1/7/2026, 8:45:58 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats