Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13548: Buffer Overflow in D-Link DIR-822K

0
High
VulnerabilityCVE-2025-13548cvecve-2025-13548
Published: Sun Nov 23 2025 (11/23/2025, 11:32:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-822K

Description

A vulnerability has been found in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. This vulnerability affects unknown code of the file /boafrm/formFirewallAdv. Such manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 11/30/2025, 12:12:07 UTC

Technical Analysis

CVE-2025-13548 is a buffer overflow vulnerability identified in D-Link DIR-822K and DWR-M920 routers running specific firmware versions (1.00_20250513164613 and 1.1.50). The vulnerability resides in the handling of the submit-url parameter within the /boafrm/formFirewallAdv endpoint, which is part of the router's web management interface. An attacker can remotely send a specially crafted HTTP request manipulating this parameter to overflow a buffer, potentially overwriting memory and enabling arbitrary code execution or causing a denial of service. The vulnerability does not require authentication or user interaction, making it highly exploitable over the network. The CVSS v4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. Although no active exploits have been observed in the wild, the public disclosure of exploit details increases the risk of imminent attacks. The affected devices are commonly used in home and small business environments, where compromise could lead to network traffic interception, lateral movement, or disruption of internet connectivity. The lack of available patches at the time of disclosure necessitates immediate mitigation strategies to reduce exposure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network infrastructure, especially for small and medium-sized enterprises and home office environments relying on D-Link DIR-822K and DWR-M920 routers. Exploitation could lead to unauthorized access to internal networks, interception of sensitive data, and disruption of internet connectivity, impacting business operations and data confidentiality. The ability to execute arbitrary code remotely without authentication increases the likelihood of widespread compromise. Additionally, compromised routers could be leveraged as footholds for further attacks or as part of botnets, amplifying the threat landscape. Given the widespread use of D-Link routers in Europe, particularly in Germany, France, and the UK, the potential impact includes operational downtime, reputational damage, and increased incident response costs.

Mitigation Recommendations

1. Monitor D-Link’s official channels for firmware updates addressing CVE-2025-13548 and apply patches immediately upon release. 2. Until patches are available, restrict access to the router’s web management interface by limiting it to trusted IP addresses or disabling remote management features. 3. Implement network segmentation to isolate vulnerable routers from critical infrastructure and sensitive data environments. 4. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous HTTP requests targeting /boafrm/formFirewallAdv or suspicious submit-url parameters. 5. Regularly audit router configurations and logs for signs of exploitation attempts or unauthorized access. 6. Educate users and administrators about the risks of using outdated firmware and the importance of timely updates. 7. Consider replacing vulnerable devices with models that have a stronger security track record if patching is delayed or unsupported.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T15:08:56.294Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6922f42ae2031d6840968b42

Added to database: 11/23/2025, 11:46:50 AM

Last enriched: 11/30/2025, 12:12:07 PM

Last updated: 1/8/2026, 2:30:27 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats