CVE-2025-13547: Memory Corruption in D-Link DIR-822K
A flaw has been found in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. This affects an unknown part of the file /boafrm/formDdns. This manipulation of the argument submit-url causes memory corruption. The attack may be initiated remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-13547 is a memory corruption vulnerability identified in D-Link DIR-822K and DWR-M920 routers running specific firmware versions (1.00_20250513164613 and 1.1.50). The vulnerability is triggered by manipulating the 'submit-url' parameter in the /boafrm/formDdns endpoint, which is part of the router's Dynamic DNS configuration interface. This improper input handling leads to memory corruption, potentially allowing an attacker to execute arbitrary code or cause a denial of service remotely. The vulnerability requires no authentication and no user interaction, making it highly exploitable over the network. The CVSS 4.0 base score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. Although no active exploitation in the wild has been reported, the availability of a public exploit increases the urgency for mitigation. The flaw affects consumer and small business routers commonly deployed in home and office environments, potentially exposing network infrastructure to compromise. The lack of an official patch at the time of publication necessitates interim protective measures to reduce exposure.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized control over affected routers, enabling attackers to intercept, modify, or disrupt network traffic. This can result in data breaches, network downtime, and facilitate further attacks such as lateral movement into corporate networks. Small and medium enterprises relying on these router models for internet connectivity are particularly at risk, as compromised routers can serve as entry points for attackers. The disruption of availability could impact business operations, especially for organizations with remote or distributed workforces. Confidentiality breaches could expose sensitive corporate or personal data. The vulnerability's remote exploitability without authentication increases the threat level, especially in environments where these devices are directly accessible from the internet. Given the widespread use of D-Link routers in Europe, the potential impact is significant, necessitating urgent attention to mitigation.
Mitigation Recommendations
1. Immediately check for and apply any firmware updates released by D-Link addressing CVE-2025-13547. 2. If patches are not yet available, restrict access to the router's management interfaces by implementing firewall rules that block inbound traffic to the /boafrm/formDdns endpoint or the router's web management ports from untrusted networks. 3. Segment networks to isolate vulnerable routers from critical infrastructure and sensitive data systems. 4. Monitor network traffic for unusual or suspicious HTTP requests targeting the Dynamic DNS configuration endpoint. 5. Disable Dynamic DNS features if not required to reduce attack surface. 6. Employ intrusion detection/prevention systems capable of recognizing exploit attempts against this vulnerability. 7. Educate IT staff and users about the risk and signs of router compromise. 8. Consider replacing affected devices with models that have confirmed security support if patches are delayed or unavailable.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2025-13547: Memory Corruption in D-Link DIR-822K
Description
A flaw has been found in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. This affects an unknown part of the file /boafrm/formDdns. This manipulation of the argument submit-url causes memory corruption. The attack may be initiated remotely. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13547 is a memory corruption vulnerability identified in D-Link DIR-822K and DWR-M920 routers running specific firmware versions (1.00_20250513164613 and 1.1.50). The vulnerability is triggered by manipulating the 'submit-url' parameter in the /boafrm/formDdns endpoint, which is part of the router's Dynamic DNS configuration interface. This improper input handling leads to memory corruption, potentially allowing an attacker to execute arbitrary code or cause a denial of service remotely. The vulnerability requires no authentication and no user interaction, making it highly exploitable over the network. The CVSS 4.0 base score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. Although no active exploitation in the wild has been reported, the availability of a public exploit increases the urgency for mitigation. The flaw affects consumer and small business routers commonly deployed in home and office environments, potentially exposing network infrastructure to compromise. The lack of an official patch at the time of publication necessitates interim protective measures to reduce exposure.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized control over affected routers, enabling attackers to intercept, modify, or disrupt network traffic. This can result in data breaches, network downtime, and facilitate further attacks such as lateral movement into corporate networks. Small and medium enterprises relying on these router models for internet connectivity are particularly at risk, as compromised routers can serve as entry points for attackers. The disruption of availability could impact business operations, especially for organizations with remote or distributed workforces. Confidentiality breaches could expose sensitive corporate or personal data. The vulnerability's remote exploitability without authentication increases the threat level, especially in environments where these devices are directly accessible from the internet. Given the widespread use of D-Link routers in Europe, the potential impact is significant, necessitating urgent attention to mitigation.
Mitigation Recommendations
1. Immediately check for and apply any firmware updates released by D-Link addressing CVE-2025-13547. 2. If patches are not yet available, restrict access to the router's management interfaces by implementing firewall rules that block inbound traffic to the /boafrm/formDdns endpoint or the router's web management ports from untrusted networks. 3. Segment networks to isolate vulnerable routers from critical infrastructure and sensitive data systems. 4. Monitor network traffic for unusual or suspicious HTTP requests targeting the Dynamic DNS configuration endpoint. 5. Disable Dynamic DNS features if not required to reduce attack surface. 6. Employ intrusion detection/prevention systems capable of recognizing exploit attempts against this vulnerability. 7. Educate IT staff and users about the risk and signs of router compromise. 8. Consider replacing affected devices with models that have confirmed security support if patches are delayed or unavailable.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T15:08:42.670Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6922eec9e2031d684090bbc2
Added to database: 11/23/2025, 11:23:53 AM
Last enriched: 11/30/2025, 12:11:49 PM
Last updated: 1/8/2026, 2:30:18 PM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21895: CWE-703: Improper Check or Handling of Exceptional Conditions in RustCrypto RSA
LowCVE-2025-8307: CWE-257 Storing Passwords in a Recoverable Format in Asseco InfoMedica Plus
MediumCVE-2025-8306: CWE-1220 Insufficient Granularity of Access Control in Asseco InfoMedica Plus
MediumCVE-2025-14025: Incorrect Execution-Assigned Permissions in Red Hat Red Hat Ansible Automation Platform 2
HighCVE-2026-21891: CWE-287: Improper Authentication in IceWhaleTech ZimaOS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.