Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13547: Memory Corruption in D-Link DIR-822K

0
High
VulnerabilityCVE-2025-13547cvecve-2025-13547
Published: Sun Nov 23 2025 (11/23/2025, 11:02:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-822K

Description

A flaw has been found in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. This affects an unknown part of the file /boafrm/formDdns. This manipulation of the argument submit-url causes memory corruption. The attack may be initiated remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 11/23/2025, 11:24:09 UTC

Technical Analysis

CVE-2025-13547 is a memory corruption vulnerability identified in specific firmware versions (1.00_20250513164613 and 1.1.50) of the D-Link DIR-822K and DWR-M920 routers. The vulnerability arises from improper handling of the 'submit-url' parameter in the /boafrm/formDdns endpoint, which can be manipulated remotely to cause memory corruption. This flaw does not require authentication or user interaction, making it highly exploitable over the network. Memory corruption vulnerabilities can lead to arbitrary code execution, denial of service, or system instability, compromising the confidentiality, integrity, and availability of the device and potentially the network it serves. The CVSS 4.0 score of 8.7 reflects its high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability impacts core router functionality, which is critical for network operations. Although no active exploits have been reported in the wild, the availability of a public exploit increases the risk of exploitation by threat actors. The lack of available patches at the time of publication necessitates immediate risk mitigation through network controls and monitoring. This vulnerability is particularly concerning for organizations relying on these D-Link models for internet connectivity or internal network routing, as exploitation could lead to unauthorized access, data leakage, or disruption of services.

Potential Impact

For European organizations, exploitation of CVE-2025-13547 could result in significant operational disruption and security breaches. Compromised routers may allow attackers to intercept or manipulate network traffic, launch further attacks within the internal network, or cause denial of service conditions. This is especially critical for sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on secure and stable network connectivity. The remote, unauthenticated nature of the vulnerability increases the attack surface, potentially allowing widespread exploitation across organizational networks. Additionally, the memory corruption could be leveraged to execute arbitrary code, leading to persistent backdoors or lateral movement within enterprise environments. The absence of patches at the time of disclosure means organizations must rely on compensating controls to reduce risk. Failure to address this vulnerability promptly could lead to data breaches, regulatory non-compliance, reputational damage, and financial losses.

Mitigation Recommendations

1. Immediately inventory and identify all D-Link DIR-822K and DWR-M920 devices running the affected firmware versions within the network. 2. Monitor vendor communications closely for firmware updates or patches addressing CVE-2025-13547 and apply them as soon as they become available. 3. Until patches are available, implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Restrict access to router management interfaces, especially the /boafrm/formDdns endpoint, by applying firewall rules or access control lists limiting connections to trusted IP addresses. 5. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting the 'submit-url' parameter. 6. Conduct regular network traffic analysis to identify anomalous requests or patterns indicative of exploitation attempts. 7. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling. 8. Consider temporary replacement or upgrade of vulnerable devices in high-risk environments if patching is delayed. 9. Maintain comprehensive logging on affected devices to support forensic investigations if exploitation is suspected. 10. Review and enhance overall network security posture to reduce exposure to similar remote vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T15:08:42.670Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6922eec9e2031d684090bbc2

Added to database: 11/23/2025, 11:23:53 AM

Last enriched: 11/23/2025, 11:24:09 AM

Last updated: 11/23/2025, 3:10:28 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats