Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13306: Command Injection in D-Link DWR-M920

0
Medium
VulnerabilityCVE-2025-13306cvecve-2025-13306
Published: Mon Nov 17 2025 (11/17/2025, 23:32:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M920

Description

A security vulnerability has been detected in D-Link DWR-M920, DWR-M921, DIR-822K and DIR-825M 1.1.5. Impacted is the function system of the file /boafrm/formDebugDiagnosticRun. The manipulation of the argument host leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 11/25/2025, 00:11:09 UTC

Technical Analysis

CVE-2025-13306 is a command injection vulnerability identified in several D-Link router models including DWR-M920, DWR-M921, DIR-822K, and DIR-825M, specifically in firmware version 1.1.5. The vulnerability resides in the system function called by the /boafrm/formDebugDiagnosticRun endpoint, where the 'host' parameter is improperly sanitized, allowing an attacker to inject arbitrary system commands. This flaw enables remote attackers to execute commands on the device without requiring authentication or user interaction, leveraging network access to the router's management interface. The vulnerability has been publicly disclosed, increasing the risk of exploitation despite no current reports of active attacks. The CVSS 4.0 score is 5.3 (medium severity), reflecting the vulnerability's moderate impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Successful exploitation could lead to full device compromise, enabling attackers to manipulate network traffic, disrupt connectivity, or pivot into internal networks. The affected devices are commonly used in home and small business environments, where they serve as critical network gateways. The lack of vendor patches at the time of disclosure necessitates immediate mitigation efforts to prevent exploitation. Network segmentation, access restrictions, and monitoring for suspicious activity are recommended until official updates are released.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromise of affected D-Link routers could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of internet connectivity. Small and medium enterprises (SMEs) and home office setups relying on these devices are particularly vulnerable due to typically weaker network defenses. The ability to execute arbitrary commands remotely without authentication increases the likelihood of automated attacks and worm propagation. Additionally, attackers could leverage compromised routers as footholds for lateral movement or launching further attacks against corporate infrastructure. The impact extends to confidentiality breaches, integrity violations through altered network configurations, and availability issues caused by device instability or denial of service. Given the widespread use of D-Link networking equipment in Europe, the vulnerability could affect a broad range of sectors including finance, healthcare, and public administration, where secure and reliable network access is critical.

Mitigation Recommendations

1. Immediately restrict access to the router management interface by limiting it to trusted IP addresses or disabling remote management if not required. 2. Implement network segmentation to isolate vulnerable devices from critical internal systems. 3. Monitor network traffic for unusual command execution patterns or unexpected outbound connections originating from the affected routers. 4. Apply vendor firmware updates as soon as they become available to patch the vulnerability. 5. If patches are not yet released, consider temporary replacement of vulnerable devices with unaffected models. 6. Employ intrusion detection/prevention systems (IDS/IPS) configured to detect exploitation attempts targeting the /boafrm/formDebugDiagnosticRun endpoint. 7. Educate users and administrators about the risks and signs of compromise related to router vulnerabilities. 8. Regularly audit and update router configurations to minimize exposure and ensure security best practices are followed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-17T14:22:32.469Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691bb389a75c6bac5fb415b1

Added to database: 11/17/2025, 11:45:13 PM

Last enriched: 11/25/2025, 12:11:09 AM

Last updated: 1/7/2026, 8:49:34 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats