CVE-2025-13547: Memory Corruption in D-Link DIR-822K
A flaw has been found in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. This affects an unknown part of the file /boafrm/formDdns. This manipulation of the argument submit-url causes memory corruption. The attack may be initiated remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-13547 is a memory corruption vulnerability identified in specific firmware versions (1.00_20250513164613 and 1.1.50) of the D-Link DIR-822K and DWR-M920 routers. The vulnerability arises from improper handling of the 'submit-url' parameter in the /boafrm/formDdns endpoint, which can be manipulated remotely to cause memory corruption. This flaw does not require authentication or user interaction, making it highly exploitable over the network. Memory corruption vulnerabilities can lead to arbitrary code execution, denial of service, or system instability, compromising the confidentiality, integrity, and availability of the device and potentially the network it serves. The CVSS 4.0 score of 8.7 reflects its high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability impacts core router functionality, which is critical for network operations. Although no active exploits have been reported in the wild, the availability of a public exploit increases the risk of exploitation by threat actors. The lack of available patches at the time of publication necessitates immediate risk mitigation through network controls and monitoring. This vulnerability is particularly concerning for organizations relying on these D-Link models for internet connectivity or internal network routing, as exploitation could lead to unauthorized access, data leakage, or disruption of services.
Potential Impact
For European organizations, exploitation of CVE-2025-13547 could result in significant operational disruption and security breaches. Compromised routers may allow attackers to intercept or manipulate network traffic, launch further attacks within the internal network, or cause denial of service conditions. This is especially critical for sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on secure and stable network connectivity. The remote, unauthenticated nature of the vulnerability increases the attack surface, potentially allowing widespread exploitation across organizational networks. Additionally, the memory corruption could be leveraged to execute arbitrary code, leading to persistent backdoors or lateral movement within enterprise environments. The absence of patches at the time of disclosure means organizations must rely on compensating controls to reduce risk. Failure to address this vulnerability promptly could lead to data breaches, regulatory non-compliance, reputational damage, and financial losses.
Mitigation Recommendations
1. Immediately inventory and identify all D-Link DIR-822K and DWR-M920 devices running the affected firmware versions within the network. 2. Monitor vendor communications closely for firmware updates or patches addressing CVE-2025-13547 and apply them as soon as they become available. 3. Until patches are available, implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Restrict access to router management interfaces, especially the /boafrm/formDdns endpoint, by applying firewall rules or access control lists limiting connections to trusted IP addresses. 5. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting the 'submit-url' parameter. 6. Conduct regular network traffic analysis to identify anomalous requests or patterns indicative of exploitation attempts. 7. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling. 8. Consider temporary replacement or upgrade of vulnerable devices in high-risk environments if patching is delayed. 9. Maintain comprehensive logging on affected devices to support forensic investigations if exploitation is suspected. 10. Review and enhance overall network security posture to reduce exposure to similar remote vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-13547: Memory Corruption in D-Link DIR-822K
Description
A flaw has been found in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. This affects an unknown part of the file /boafrm/formDdns. This manipulation of the argument submit-url causes memory corruption. The attack may be initiated remotely. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13547 is a memory corruption vulnerability identified in specific firmware versions (1.00_20250513164613 and 1.1.50) of the D-Link DIR-822K and DWR-M920 routers. The vulnerability arises from improper handling of the 'submit-url' parameter in the /boafrm/formDdns endpoint, which can be manipulated remotely to cause memory corruption. This flaw does not require authentication or user interaction, making it highly exploitable over the network. Memory corruption vulnerabilities can lead to arbitrary code execution, denial of service, or system instability, compromising the confidentiality, integrity, and availability of the device and potentially the network it serves. The CVSS 4.0 score of 8.7 reflects its high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability impacts core router functionality, which is critical for network operations. Although no active exploits have been reported in the wild, the availability of a public exploit increases the risk of exploitation by threat actors. The lack of available patches at the time of publication necessitates immediate risk mitigation through network controls and monitoring. This vulnerability is particularly concerning for organizations relying on these D-Link models for internet connectivity or internal network routing, as exploitation could lead to unauthorized access, data leakage, or disruption of services.
Potential Impact
For European organizations, exploitation of CVE-2025-13547 could result in significant operational disruption and security breaches. Compromised routers may allow attackers to intercept or manipulate network traffic, launch further attacks within the internal network, or cause denial of service conditions. This is especially critical for sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on secure and stable network connectivity. The remote, unauthenticated nature of the vulnerability increases the attack surface, potentially allowing widespread exploitation across organizational networks. Additionally, the memory corruption could be leveraged to execute arbitrary code, leading to persistent backdoors or lateral movement within enterprise environments. The absence of patches at the time of disclosure means organizations must rely on compensating controls to reduce risk. Failure to address this vulnerability promptly could lead to data breaches, regulatory non-compliance, reputational damage, and financial losses.
Mitigation Recommendations
1. Immediately inventory and identify all D-Link DIR-822K and DWR-M920 devices running the affected firmware versions within the network. 2. Monitor vendor communications closely for firmware updates or patches addressing CVE-2025-13547 and apply them as soon as they become available. 3. Until patches are available, implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Restrict access to router management interfaces, especially the /boafrm/formDdns endpoint, by applying firewall rules or access control lists limiting connections to trusted IP addresses. 5. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting the 'submit-url' parameter. 6. Conduct regular network traffic analysis to identify anomalous requests or patterns indicative of exploitation attempts. 7. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling. 8. Consider temporary replacement or upgrade of vulnerable devices in high-risk environments if patching is delayed. 9. Maintain comprehensive logging on affected devices to support forensic investigations if exploitation is suspected. 10. Review and enhance overall network security posture to reduce exposure to similar remote vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T15:08:42.670Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6922eec9e2031d684090bbc2
Added to database: 11/23/2025, 11:23:53 AM
Last enriched: 11/23/2025, 11:24:09 AM
Last updated: 11/23/2025, 3:10:28 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13553: Buffer Overflow in D-Link DWR-M920
HighCVE-2025-13552: Buffer Overflow in D-Link DIR-822K
HighCVE-2025-13551: Buffer Overflow in D-Link DIR-822K
HighCVE-2025-13550: Buffer Overflow in D-Link DIR-822K
HighCVE-2025-13549: Buffer Overflow in D-Link DIR-822K
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.