CVE-2025-13306: Command Injection in D-Link DWR-M920
A security vulnerability has been detected in D-Link DWR-M920, DWR-M921, DIR-822K and DIR-825M 1.1.5. Impacted is the function system of the file /boafrm/formDebugDiagnosticRun. The manipulation of the argument host leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-13306 is a command injection vulnerability identified in several D-Link router models, specifically DWR-M920, DWR-M921, DIR-822K, and DIR-825M running firmware version 1.1.5. The vulnerability resides in the system function invoked by the /boafrm/formDebugDiagnosticRun endpoint, which accepts a 'host' parameter. Due to insufficient input validation or sanitization, an attacker can craft malicious input for this parameter to inject arbitrary shell commands. This flaw allows remote attackers to execute commands on the underlying operating system with the privileges of the router's system process. The attack vector is network-based, requiring no authentication or user interaction, making it highly accessible to remote adversaries. The CVSS 4.0 vector indicates low attack complexity and no privileges required, but with limited confidentiality, integrity, and availability impact scope, resulting in a medium severity rating of 5.3. Although no confirmed exploits in the wild have been reported, public disclosure of the vulnerability and proof-of-concept code increases the risk of exploitation. The affected devices are commonly used in small office/home office and enterprise edge environments, where compromise could lead to network traffic interception, device control, or denial of service. The lack of vendor patches at the time of disclosure necessitates immediate mitigation efforts by disabling vulnerable diagnostic features or isolating affected devices from untrusted networks.
Potential Impact
For European organizations, the vulnerability poses a risk of unauthorized remote command execution on affected D-Link routers, potentially leading to device compromise, network traffic manipulation, or denial of service. This can undermine the confidentiality and integrity of internal communications and disrupt business operations, especially for small and medium enterprises relying on these devices at network edges. Critical infrastructure sectors using these routers as part of their connectivity solutions could face increased exposure to cyberattacks. The medium CVSS score reflects a moderate risk, but the ease of remote exploitation without authentication elevates the threat level. Additionally, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. Organizations may experience operational disruptions, data breaches, or lateral movement by attackers leveraging compromised routers as footholds within networks.
Mitigation Recommendations
1. Monitor D-Link's official channels for firmware updates addressing CVE-2025-13306 and apply patches promptly once available. 2. Until patches are released, disable or restrict access to the /boafrm/formDebugDiagnosticRun diagnostic endpoint if possible, either via router configuration or network firewall rules. 3. Segment affected routers from untrusted networks, limiting remote access to management interfaces to trusted internal networks only. 4. Implement network intrusion detection systems (NIDS) to monitor for suspicious requests targeting the vulnerable endpoint. 5. Regularly audit router configurations and logs for signs of exploitation attempts or unauthorized command execution. 6. For organizations using these devices in critical environments, consider replacing them with models not affected by this vulnerability. 7. Educate IT staff about the vulnerability and ensure incident response plans include steps for compromised router scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-13306: Command Injection in D-Link DWR-M920
Description
A security vulnerability has been detected in D-Link DWR-M920, DWR-M921, DIR-822K and DIR-825M 1.1.5. Impacted is the function system of the file /boafrm/formDebugDiagnosticRun. The manipulation of the argument host leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13306 is a command injection vulnerability identified in several D-Link router models, specifically DWR-M920, DWR-M921, DIR-822K, and DIR-825M running firmware version 1.1.5. The vulnerability resides in the system function invoked by the /boafrm/formDebugDiagnosticRun endpoint, which accepts a 'host' parameter. Due to insufficient input validation or sanitization, an attacker can craft malicious input for this parameter to inject arbitrary shell commands. This flaw allows remote attackers to execute commands on the underlying operating system with the privileges of the router's system process. The attack vector is network-based, requiring no authentication or user interaction, making it highly accessible to remote adversaries. The CVSS 4.0 vector indicates low attack complexity and no privileges required, but with limited confidentiality, integrity, and availability impact scope, resulting in a medium severity rating of 5.3. Although no confirmed exploits in the wild have been reported, public disclosure of the vulnerability and proof-of-concept code increases the risk of exploitation. The affected devices are commonly used in small office/home office and enterprise edge environments, where compromise could lead to network traffic interception, device control, or denial of service. The lack of vendor patches at the time of disclosure necessitates immediate mitigation efforts by disabling vulnerable diagnostic features or isolating affected devices from untrusted networks.
Potential Impact
For European organizations, the vulnerability poses a risk of unauthorized remote command execution on affected D-Link routers, potentially leading to device compromise, network traffic manipulation, or denial of service. This can undermine the confidentiality and integrity of internal communications and disrupt business operations, especially for small and medium enterprises relying on these devices at network edges. Critical infrastructure sectors using these routers as part of their connectivity solutions could face increased exposure to cyberattacks. The medium CVSS score reflects a moderate risk, but the ease of remote exploitation without authentication elevates the threat level. Additionally, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. Organizations may experience operational disruptions, data breaches, or lateral movement by attackers leveraging compromised routers as footholds within networks.
Mitigation Recommendations
1. Monitor D-Link's official channels for firmware updates addressing CVE-2025-13306 and apply patches promptly once available. 2. Until patches are released, disable or restrict access to the /boafrm/formDebugDiagnosticRun diagnostic endpoint if possible, either via router configuration or network firewall rules. 3. Segment affected routers from untrusted networks, limiting remote access to management interfaces to trusted internal networks only. 4. Implement network intrusion detection systems (NIDS) to monitor for suspicious requests targeting the vulnerable endpoint. 5. Regularly audit router configurations and logs for signs of exploitation attempts or unauthorized command execution. 6. For organizations using these devices in critical environments, consider replacing them with models not affected by this vulnerability. 7. Educate IT staff about the vulnerability and ensure incident response plans include steps for compromised router scenarios.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-17T14:22:32.469Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691bb389a75c6bac5fb415b1
Added to database: 11/17/2025, 11:45:13 PM
Last enriched: 11/18/2025, 12:00:08 AM
Last updated: 11/18/2025, 7:44:08 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7623: CWE-121: Stack-based Buffer Overflow in SMCI SYS-111C-NR
MediumCVE-2025-8076: CWE-121: Stack-based Buffer Overflow in SMCI MBD-X13SEDW-F
HighKongTuke activity, (Tue, Nov 18th)
MediumCVE-2025-12524: CWE-639 Authorization Bypass Through User-Controlled Key in johnjamesjacoby Post Type Switcher
MediumCVE-2025-48593: Remote code execution in Google Android
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.