Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13306: Command Injection in D-Link DWR-M920

0
Medium
VulnerabilityCVE-2025-13306cvecve-2025-13306
Published: Mon Nov 17 2025 (11/17/2025, 23:32:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M920

Description

A security vulnerability has been detected in D-Link DWR-M920, DWR-M921, DIR-822K and DIR-825M 1.1.5. Impacted is the function system of the file /boafrm/formDebugDiagnosticRun. The manipulation of the argument host leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 11/18/2025, 00:00:08 UTC

Technical Analysis

CVE-2025-13306 is a command injection vulnerability identified in several D-Link router models, specifically DWR-M920, DWR-M921, DIR-822K, and DIR-825M running firmware version 1.1.5. The vulnerability resides in the system function invoked by the /boafrm/formDebugDiagnosticRun endpoint, which accepts a 'host' parameter. Due to insufficient input validation or sanitization, an attacker can craft malicious input for this parameter to inject arbitrary shell commands. This flaw allows remote attackers to execute commands on the underlying operating system with the privileges of the router's system process. The attack vector is network-based, requiring no authentication or user interaction, making it highly accessible to remote adversaries. The CVSS 4.0 vector indicates low attack complexity and no privileges required, but with limited confidentiality, integrity, and availability impact scope, resulting in a medium severity rating of 5.3. Although no confirmed exploits in the wild have been reported, public disclosure of the vulnerability and proof-of-concept code increases the risk of exploitation. The affected devices are commonly used in small office/home office and enterprise edge environments, where compromise could lead to network traffic interception, device control, or denial of service. The lack of vendor patches at the time of disclosure necessitates immediate mitigation efforts by disabling vulnerable diagnostic features or isolating affected devices from untrusted networks.

Potential Impact

For European organizations, the vulnerability poses a risk of unauthorized remote command execution on affected D-Link routers, potentially leading to device compromise, network traffic manipulation, or denial of service. This can undermine the confidentiality and integrity of internal communications and disrupt business operations, especially for small and medium enterprises relying on these devices at network edges. Critical infrastructure sectors using these routers as part of their connectivity solutions could face increased exposure to cyberattacks. The medium CVSS score reflects a moderate risk, but the ease of remote exploitation without authentication elevates the threat level. Additionally, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. Organizations may experience operational disruptions, data breaches, or lateral movement by attackers leveraging compromised routers as footholds within networks.

Mitigation Recommendations

1. Monitor D-Link's official channels for firmware updates addressing CVE-2025-13306 and apply patches promptly once available. 2. Until patches are released, disable or restrict access to the /boafrm/formDebugDiagnosticRun diagnostic endpoint if possible, either via router configuration or network firewall rules. 3. Segment affected routers from untrusted networks, limiting remote access to management interfaces to trusted internal networks only. 4. Implement network intrusion detection systems (NIDS) to monitor for suspicious requests targeting the vulnerable endpoint. 5. Regularly audit router configurations and logs for signs of exploitation attempts or unauthorized command execution. 6. For organizations using these devices in critical environments, consider replacing them with models not affected by this vulnerability. 7. Educate IT staff about the vulnerability and ensure incident response plans include steps for compromised router scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-17T14:22:32.469Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691bb389a75c6bac5fb415b1

Added to database: 11/17/2025, 11:45:13 PM

Last enriched: 11/18/2025, 12:00:08 AM

Last updated: 11/18/2025, 7:44:08 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats