CVE-2025-13306: Command Injection in D-Link DWR-M920
A security vulnerability has been detected in D-Link DWR-M920, DWR-M921, DIR-822K and DIR-825M 1.1.5. Impacted is the function system of the file /boafrm/formDebugDiagnosticRun. The manipulation of the argument host leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-13306 is a command injection vulnerability identified in several D-Link router models including DWR-M920, DWR-M921, DIR-822K, and DIR-825M, specifically in firmware version 1.1.5. The vulnerability resides in the system function called by the /boafrm/formDebugDiagnosticRun endpoint, where the 'host' parameter is improperly sanitized, allowing an attacker to inject arbitrary system commands. This flaw enables remote attackers to execute commands on the device without requiring authentication or user interaction, leveraging network access to the router's management interface. The vulnerability has been publicly disclosed, increasing the risk of exploitation despite no current reports of active attacks. The CVSS 4.0 score is 5.3 (medium severity), reflecting the vulnerability's moderate impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Successful exploitation could lead to full device compromise, enabling attackers to manipulate network traffic, disrupt connectivity, or pivot into internal networks. The affected devices are commonly used in home and small business environments, where they serve as critical network gateways. The lack of vendor patches at the time of disclosure necessitates immediate mitigation efforts to prevent exploitation. Network segmentation, access restrictions, and monitoring for suspicious activity are recommended until official updates are released.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromise of affected D-Link routers could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of internet connectivity. Small and medium enterprises (SMEs) and home office setups relying on these devices are particularly vulnerable due to typically weaker network defenses. The ability to execute arbitrary commands remotely without authentication increases the likelihood of automated attacks and worm propagation. Additionally, attackers could leverage compromised routers as footholds for lateral movement or launching further attacks against corporate infrastructure. The impact extends to confidentiality breaches, integrity violations through altered network configurations, and availability issues caused by device instability or denial of service. Given the widespread use of D-Link networking equipment in Europe, the vulnerability could affect a broad range of sectors including finance, healthcare, and public administration, where secure and reliable network access is critical.
Mitigation Recommendations
1. Immediately restrict access to the router management interface by limiting it to trusted IP addresses or disabling remote management if not required. 2. Implement network segmentation to isolate vulnerable devices from critical internal systems. 3. Monitor network traffic for unusual command execution patterns or unexpected outbound connections originating from the affected routers. 4. Apply vendor firmware updates as soon as they become available to patch the vulnerability. 5. If patches are not yet released, consider temporary replacement of vulnerable devices with unaffected models. 6. Employ intrusion detection/prevention systems (IDS/IPS) configured to detect exploitation attempts targeting the /boafrm/formDebugDiagnosticRun endpoint. 7. Educate users and administrators about the risks and signs of compromise related to router vulnerabilities. 8. Regularly audit and update router configurations to minimize exposure and ensure security best practices are followed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-13306: Command Injection in D-Link DWR-M920
Description
A security vulnerability has been detected in D-Link DWR-M920, DWR-M921, DIR-822K and DIR-825M 1.1.5. Impacted is the function system of the file /boafrm/formDebugDiagnosticRun. The manipulation of the argument host leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13306 is a command injection vulnerability identified in several D-Link router models including DWR-M920, DWR-M921, DIR-822K, and DIR-825M, specifically in firmware version 1.1.5. The vulnerability resides in the system function called by the /boafrm/formDebugDiagnosticRun endpoint, where the 'host' parameter is improperly sanitized, allowing an attacker to inject arbitrary system commands. This flaw enables remote attackers to execute commands on the device without requiring authentication or user interaction, leveraging network access to the router's management interface. The vulnerability has been publicly disclosed, increasing the risk of exploitation despite no current reports of active attacks. The CVSS 4.0 score is 5.3 (medium severity), reflecting the vulnerability's moderate impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Successful exploitation could lead to full device compromise, enabling attackers to manipulate network traffic, disrupt connectivity, or pivot into internal networks. The affected devices are commonly used in home and small business environments, where they serve as critical network gateways. The lack of vendor patches at the time of disclosure necessitates immediate mitigation efforts to prevent exploitation. Network segmentation, access restrictions, and monitoring for suspicious activity are recommended until official updates are released.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromise of affected D-Link routers could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of internet connectivity. Small and medium enterprises (SMEs) and home office setups relying on these devices are particularly vulnerable due to typically weaker network defenses. The ability to execute arbitrary commands remotely without authentication increases the likelihood of automated attacks and worm propagation. Additionally, attackers could leverage compromised routers as footholds for lateral movement or launching further attacks against corporate infrastructure. The impact extends to confidentiality breaches, integrity violations through altered network configurations, and availability issues caused by device instability or denial of service. Given the widespread use of D-Link networking equipment in Europe, the vulnerability could affect a broad range of sectors including finance, healthcare, and public administration, where secure and reliable network access is critical.
Mitigation Recommendations
1. Immediately restrict access to the router management interface by limiting it to trusted IP addresses or disabling remote management if not required. 2. Implement network segmentation to isolate vulnerable devices from critical internal systems. 3. Monitor network traffic for unusual command execution patterns or unexpected outbound connections originating from the affected routers. 4. Apply vendor firmware updates as soon as they become available to patch the vulnerability. 5. If patches are not yet released, consider temporary replacement of vulnerable devices with unaffected models. 6. Employ intrusion detection/prevention systems (IDS/IPS) configured to detect exploitation attempts targeting the /boafrm/formDebugDiagnosticRun endpoint. 7. Educate users and administrators about the risks and signs of compromise related to router vulnerabilities. 8. Regularly audit and update router configurations to minimize exposure and ensure security best practices are followed.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-17T14:22:32.469Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691bb389a75c6bac5fb415b1
Added to database: 11/17/2025, 11:45:13 PM
Last enriched: 11/25/2025, 12:11:09 AM
Last updated: 1/7/2026, 8:49:34 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.